by Andrew Shumate | Mar 23, 2017 | InfoSec Strategies
The litany of hacks against Internet of Things (IoT) connected devices is getting longer by the CPU cycle. If you’re not already worried because of the Mirai Worm, check out this simulated ransomware-based attack that enables hackers to manipulate key programmable...
by Andrew Shumate | Mar 2, 2017 | Disaster Recovery
If you happened to catch Mariah Carey’s “epic fail” performance on the ABC Channel this past New Year’s Eve, you’ve seen first-hand that equipment failure during a live performance can be disastrous. Equipment issues also created challenges for Lady Gaga and...
by Andrew Shumate | Feb 28, 2017 | InfoSec Risk Assessment
This post has been brewing for some time. I decided for sure to write it after digesting the press fallout from the most recent series of vulnerability research trade shows, colloquially known as hacker summer camp. With RSA behind us and CFP season beginning, I...
by Andrew Shumate | Aug 16, 2016 | InfoSec Risk Assessment
Risk assessment is a fascinating activity that is relevant to everyone, all the time, and involves both our individual, subjective interpretation and the pure objectivity of statistics. Money, power, security, survival, rationality, emotion—it all comes into play when...
by Andrew Shumate | Aug 2, 2016 | InfoSec Strategies
The other day I heard from a client in the legal vertical seeking advice. Some attorneys in his firm had proved to be less than enthusiastic about following some of the newly established information security policies put in place around their ISO 27001 certification...