Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Handle With Care: 5 Tips for Dealing With Toxic Data

    Protecting data is always a top priority of any cyber security effort. What’s less obvious — but just as important — is knowing when to get rid of data when it ages. As you work toward protecting your data, remember that building better walls only helps to keep new threats out. You still must address ... The post Handle With Care: 5 Tips for Dealing With Toxic Data appeared first on Lunarline Blog...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Go Phish: How to Thwart Phishing Attempts

    Phishing — one of the most common forms of social engineering attack — has been tricking internet users into divulging personal data since the mid-1990s. And this threat is still going strong today, defrauding individuals and organizations on a massive scale and bringing in ill-gotten gains for cyber criminals. Part of the problem with combating ... The post Go Phish: How to Thwart Phishing Attemp...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • In Case the iCloud Threat Is Real

    Extortion has long been a popular method for hackers to get what they want from their exploits. Ransomware attacks, where a cybercriminal seizes a tech resource and demands payment to reinstate access, have been on the rise for several years. In some recent politically motivated attacks, hacktivists have used blackmail tactics to try and force ... The post In Case the iCloud Threat Is Real appeare...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Small Business Owners Can’t Afford to Ignore Cyber Security

    On March 9, a group of cyber security industry panelists met at a House Homeland Security subcommittee meeting to discuss the state of cyber security in the private sector and engagement with the DHS. Across the group of experts, there was an overarching consensus that businesses large and small that have experienced significant effects from ... The post Small Business Owners Can’t Afford to Ignor...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • The Cost of Hacking: Intellectual Property Theft

    In September 2015, then-President Barack Obama met Chinese President Xi Jinping to sign a agreement on cyber espionage pledging to cease state-backed hacking of private-sector firms in each other’s country. A year after the agreement, analysts reported that Chinese hacking has declined considerably However, Chinese hackers haven’t been completely deterred from intellectual property theft. Intellec...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • How Safe Are Password Managers?

    In these hyper-connected times, many of us are logged on to several online services throughout the day. In a 2014 report on the use of mobile apps, Nielsen researchers found that the average smartphone owner uses about 26 apps per month. Considering the most popular apps – from social networks like Facebook to email applications ... The post How Safe Are Password Managers? appeared first on Lunarl...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • Cloudflare’s “Cloudbleed”: What Your Organization Can Learn

    Cloudflare, an online infrastructure company, recently discovered that a security flaw in its coding has led to a leak of sensitive data affecting approximately 3,400 websites. This incident is similar to (though smaller in scale than) one that happened in 2014, involving a bug called “Heartbleed.” For this reason, Google Project Zero researcher Tavis Ormandy ... The post Cloudflare’s “Cloudbleed”...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 month ago

New blog articles detected

  • All VPNs Are Not Created Equal

    Virtual Private Networks (VPNs) have long been a popular tool for online privacy. Businesses have implemented them to securely connect remote workers to corporate resources. Privacy-conscious individuals have used them to keep their browsing private on public networks. Savvy consumers of digital media have switched them on to access content only available in another geographic ... The post All VPN...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Data Breaches: Don’t Put Your Brand at Risk

    Risk management and cyber security analysts have focused on the substantial costs of data breaches for some time. In a 2016 report, Ponemon Institute reported that the average total cost of a breach rose from $3.8 million to $4 million, with the per-record cost rising from $154 to $158. Naturally, companies have taken note of ... The post Data Breaches: Don’t Put Your Brand at Risk appeared first ...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Wanted: Employees Willing to Steal Data

    Insider threats are hardly a new problem. As companies increasingly rely on data connected to complex networks, they also rely on their employees to make sure that data stays out of the wrong hands. The trouble is, unlike the hackers lurking outside the corporate network, insiders can directly access sensitive information and critical systems without ... The post Wanted: Employees Willing to Steal...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • A Simple Cyber Security Plan Is the Best Kind of Plan

    In the past few years, enterprise networks have quickly grown in complexity, spurred by demand for bring-your-own-device (BYOD) policies, cloud computing and virtualization, among other factors. Unsurprisingly, this increased complexity has called for new cyber security considerations, as firms work to maintain the protection of their sensitive data. However, if you think the complexity of ... The...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Get Ready for Updated NIST Compliance Requirements

    Like so many areas of the American political system, federal cyber security regulation is in a period of transition. Some of the change is an effect of the presidential handoff to an administration with a markedly different agenda from the previous one. But an even greater driver has been the failure of some government agencies ... The post Get Ready for Updated NIST Compliance Requirements appear...

  • The Top Cyber Security Threats in 2017

    Before leaving the White House, President Obama has sought to make defense from cyber security threats a national priority for the near future, proposing a 35% increase in budget ($19 billion) for cyber defense in 2017. As news stories of election hacks and record-breaking data breaches dominate headlines, it should be no mystery to anyone ... The post The Top Cyber Security Threats in 2017 appear...

  • Lunarline’s Top 5 Blog Posts of 2016

    We can all agree that 2016 was a big year marked by some big surprises. In several countries, voters ushered in unexpected changes, enacting dramatic sea changes in their nations’ politics. America’s election resulted in an upset victory for Donald Trump. In sports, the Chicago Cubs won their first World Series since 1908, and the ... The post Lunarline’s Top 5 Blog Posts of 2016 appeared first on...

  • Cyber Security Maturity is Not Measured in Pages

    If you want to understand maturity, watch a jazz concert. Much of what you hear is improvised, right there before your eyes. The music you hear is so well integrated, it seems that it’s already been planned. But in fact the musicians are making it up as you watch. How? They are following a set ... The post Cyber Security Maturity is Not Measured in Pages appeared first on Lunarline Blog.

  • Your Cyber Security Training Plan for 2017

    There are only a few days of 2016 left. We wave goodbye to a year that has, yet again, placed issues of cyber security at the center of the nation’s attention. Even now, Russian hackers, after their suspected attempts to influence the 2016 election outcome, are grabbing top headlines. Meanwhile, Yahoo attempts to rebound from ... The post Your Cyber Security Training Plan for 2017 appeared first o...

  • Will FedRAMP Accelerated Save CSPs Money?

    In September, the FedRAMP Program Management Office (PMO) published an article, which addressed the costs associated with going through FedRAMP. The price came out to an average cost of $3,250,000. This cost includes work hours and component costs for engineering the system, developing system documentation, the 3PAO assessment of the system, FedRAMP JAB review and ... The post Will FedRAMP Acceler...

  • Safe Travels: How to Protect Your Home During the Holidays

    In the classic Christmas movie Home Alone, the precocious Macaulay Culkin had his hands full protecting his home from two bumbling burglars, Harry and Marv. It was the good old days, when life was simpler and technology had not yet ruined the nostalgia of old-fashioned stake-outs: The pair would spend the days leading up to ... The post Safe Travels: How to Protect Your Home During the Holidays ap...

  • Cyber Security Insurance Is No Excuse for Poor Security

    Data has become so valuable and so critical to businesses that often, it is a company’s most protected asset. If a data breach were to happen today, it likely will have far-reaching consequences. These range from steep legal fees and regulatory fines, to intellectual property loss and reputation damage. The costs can be devastating, and ... The post Cyber Security Insurance Is No Excuse for Poor S...

  • What Donald Trump Must Do to Improve Cyber Security

    The 2016 presidential election took more than a few people by surprise. But shocked or not, the result is the same: Donald Trump will take office in January, representing a major shift in American politics. If we take the president-elect at his word, much of the policy President Barack Obama and his administration enacted over ... The post What Donald Trump Must Do to Improve Cyber Security appear...

  • Do You Speak Security? 10 Cyber Security Terms You Need to Know

    Unless you work in the IT department, you probably haven’t had to know much about cyber security. Still, while you may not know how to chase off hackers, as cyber security becomes a crucial risk management concern for your company and others, you’ll need to understand it. The world of cyber security can feel foreign ... The post Do You Speak Security? 10 Cyber Security Terms You Need to Know appea...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 7 months ago

New blog articles detected

  • Hacking the Heartland (Part 3): Safeguarding Farming Data

    Drive through any stretch of American farmland, and you’ll see miles of reinforced fencing that protects crops and keeps out unauthorized visitors. It’s clear that security is a high priority at these critical purveyors of the U.S. food supply — and, of course, that’s for good reason. However, in an increasingly data-centered world, U.S. farms ... The post Hacking the Heartland (Part 3): Safeguard...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 7 months ago

New blog articles detected

  • Risk Management – From Paper to Reality

    So you have completed your security controls assessment. You have beautiful risk assessment reports, and a big beautiful plan of action and milestones (POA&M). Now what? You have to bring your plan to manage risk into reality. According to the Department of Homeland Security’s Office of Cybersecurity and Communications, if you stacked all of the ... The post Risk Management – From Paper to Reality...

  • Hacking the Heartland (Part 2): Farming Intellectual Property

    Having your trade secrets hacked is never a good thing, but there are certain areas within the U.S. economy where a hacked trade secret could lead way to an absolute disaster. One of those industries that many people don’t typically associate with highly sophisticated technology: agriculture. Nonetheless, the ag industry is currently a top concern ... The post Hacking the Heartland (Part 2): Farmi...

  • Cyber Security: If You Don’t Know the Mission, You Don’t Know the Risk

    Like the good cyber security stewards we are, we regularly inventory our assets, assess known vulnerabilities, and stay abreast of the latest threat intelligence. So we know our risk, right? Not necessarily. When assessing risk, many cyber security professionals think of the technological impact, such as webserver downtime or the inability to deliver email. The ... The post Cyber Security: If You ...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 7 months ago

New blog articles detected

  • Are You Ready for the New FedRAMP Readiness Capabilities Assessment?

    With the final release of the FedRAMP Readiness Assessment Report (RAR) template earlier this month, there is a new assessment process that will greatly impact cloud service providers (CSPs). As part of the FedRAMP Accelerated initiative, CSPs working towards a FedRAMP JAB P-ATO must achieve a FedRAMP-Ready status based on the Readiness Capabilities Assessment performed ... The post Are You Ready ...

  • Hacking the Heartland: Old MacDonald Got Hacked (Part 1)

    What kind of imagery does the term “cyber security landscape” conjure up for you? Chances are, it’s not the wide-open, rolling fields you see on farmlands. In fact, that is the kind of scenery you’d expect to be far removed from the world of hackers and complicated data networks. But it’s precisely this setting where ... The post Hacking the Heartland: Old MacDonald Got Hacked (Part 1) appeared fi...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 7 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 8 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 8 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in