Red Lambda Blog

Posted In:
IT Security Network Security Cybersecurity

DNC Hacking and The Cybersecurity Blame Game

Posted on January 11, 2017 by Bahram Yusefzadeh, Chairman

The American intelligence community is convinced beyond a reasonable doubt that the Russians breached DNC computers in an attempt to influence the American election. The Russian authorities say they didn’t perpetrate the cyber attack and deny any attempt to influence a US Presidential election. Meanwhile, the press continues to play the too familiar “blame game” focused on who was responsible for the 2016 DNC data breach.

 

However, while the coverage and contention on the perpetrators of the DNC data breach continues, there has been little attention placed on the failed security practices of the DNC and other government groups.

 

Read More

Posted In:
IT Security Network Security Cybersecurity Small Business

Cybersecurity for All - Including the "Small"

Posted on December 21, 2016 by Bahram Yusefzadeh, Chairman

A recent article published at Florida Trend addressed the fact that nearly 45% of the Florida’s private workforce was employed by small business which are all vulnerable to a large and growing problem: cybersecurity.

 

And Florida certainly isn’t alone in these concerns.

Read More

Posted In:
IT Security Industry Trends Network Security Cyber Threat Detection Technology

Human Nature: The Cyber World's Most Powerful Defense...and its Greatest Vulnerability

Posted on December 01, 2016 by Bahram Yusefzadeh, Chairman

While the human mind is responsible for the great technological cyber achievements of storing, accessing, understanding, and protecting vast amounts of data, it also represents the greatest vulnerability placing these achievements at risk.

Read More

Posted In:
IT Security Industry Trends Network Security Cyber Threat Detection Technology

Big Stick Cyber Diplomacy

Posted on October 20, 2016 by Bahram Yusefzadeh, Chairman

 

With only weeks remaining before a US presidential election, much is being said about the leaked DNC e-mails. While the contents of these e-mails may be controversial, the questions about who perpetrated the attack, and what should be done about it, raise issues that are equally controversial and may have long-term implications.

 

Read More

Posted In:
IT Security Industry Trends Network Security Cyber Threat Detection Technology

The Cyber Elephant in the Oval Office

Posted on October 13, 2016 by Bahram Yusefzadeh, Chairman

 

A recent online article published in InfoRisk Today summarized the positions of leading US presidential candidates. Unfortunately, these positions fail to address a critical gap in our nation’s security.

Read More