• On the Importance of Protecting U.S. Pipeline Owners and Operators 23 June 2021, 11:12 AM In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast. Less than a week later, Bloomberg reported that the company had […]… Read More The post On the Importance of Protecting U.S. Pipeline Owners and Operators appeared first on The State of Security.
  • Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135 22 June 2021, 05:01 PM Back in September 2020, I configured a SonicWall network security appliance to act as a VPN gateway between physical devices in my home lab and cloud resources on my Azure account. As I usually do with new devices on my network, I did some cursory security analysis of the product and it didn’t take long […]… Read More The post Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135 appeared first on The State of Security.
  • The Top 5 Vendor-Neutral Cloud Security Certifications of 2021 22 June 2021, 09:19 AM Most organizations have already begun their shift to the cloud. In its Cloud Computing Survey 2020, for instance, International Data Group (IDG) found that 81% of respondents had at least one workload or segment of their computing infrastructure in the cloud. That percentage could grow by the end of the year, as IDG found that […]… Read More The post The Top 5 Vendor-Neutral Cloud Security Certifications of 2021 appeared first on The State of Security.
  • Voice-Activated Device Privacy: What You Need to Know 22 June 2021, 08:12 AM When it comes to evaluating technology in the home, there seems to be no shortage of new devices and shiny gadgets, mainly part of the Internet of Things (IoT), to discuss. Unfortunately, there seems to be no shortage of security issues to consider regarding these same devices, either. It’s not uncommon to hear of “virtual […]… Read More The post Voice-Activated Device Privacy: What You Need to Know appeared first on The State of Security.
  • The Evolution of Securing Critical Infrastructure 22 June 2021, 08:12 AM Everything evolves. Simply stated, the gradual development of something from a simple to a more complex form is what evolution is all about. When something ceases to evolve, yet still exists, it becomes classified as a living fossil. One example is the Ginkgo Biloba tree. It took millions of years for this evolution to cease. This all happened […]… Read More The post The Evolution of Securing Critical Infrastructure appeared first on The State of Security.