Challenges of Industrial Control System Cybersecurity

Today, industrial control system cybersecurity is mainly focused on securing networks, and efforts generally ignore process control equipment that is critical for plant safety and reliability, which leaves it woefully vulnerable. As the number and severity of attacks on our [...]

Challenges of Industrial Control System Cybersecurity2020-03-27T17:09:40-07:00

Ransomware v2.0 Recovery – Now, encrypted or deleted backups!

Warning!!! We have entered a new, even more malicious, era for ransomware that is hitting mid-market companies particularly hard, with deleted or encrypted backups. The two stories I share below are chilling… For the last five years or so, ransomware [...]

Ransomware v2.0 Recovery – Now, encrypted or deleted backups!2021-01-28T17:48:31-08:00

Moody’s Cyber-Risk Ratings & Impact for Enterprises

Written by Kevin McDonald, COO and CISO of Alvaka Networks. Originally published December 2018 on TechTarget. Kevin explores what Moody's new cyber-risk ratings could mean for enterprises and the infosec industry. Having access to credit is critical for any healthy company, [...]

Moody’s Cyber-Risk Ratings & Impact for Enterprises2021-01-28T20:03:25-08:00

Where is the American Firewall?

Written by Robert Rennie – Originally published on Medium on November 15, 2018. Note: The following blog is opinion-based. The views and opinions expressed in this blog article are solely those of the author and do not necessarily reflect the [...]

Where is the American Firewall?2020-10-04T23:56:06-07:00

Cybersecurity is an Organized Behavior [Podcast] – with Kevin McDonald

COO and CISO of Alvaka Networks, Kevin McDonald, sits down with Brian Sherman of IoTSSA for a very candid conversation on building a successful cybersecurity offering. He offers some great advice in this episode, such as using law enforcement as [...]

Cybersecurity is an Organized Behavior [Podcast] – with Kevin McDonald2021-01-28T14:26:06-08:00

A Scary Incident of a $21.5 Million Successful CEO Phishing Fraud

Phishing is a scam usually executed via email or text messaging. The perpetrator usually poses as someone you know and they induce you to send them money. The incident explained below could also be called spear phishing or whaling, in [...]

A Scary Incident of a $21.5 Million Successful CEO Phishing Fraud2019-12-13T12:14:52-08:00

Will Patching Break My Network?

IT organizations understand the importance of applying current security updates, or "patches", to the operating systems and software applications running in their environment. However, many are reluctant to do so for fear of "breaking" their systems and causing outages. And, [...]

Will Patching Break My Network?2020-03-27T17:26:27-07:00

Why Don’t IT Departments Fully Patch Their Environments?

The failure to fully apply security updates (patches) to operating systems and software applications is the leading cause of cybersecurity compromise. A recent survey by Ponemon Institute of over 3,000 organizations, found that half had experienced a cybersecurity breach in [...]

Why Don’t IT Departments Fully Patch Their Environments?2020-03-27T17:28:15-07:00

Alvaka Networks Speed and Feed Driving Events

Periodically, Alvaka Networks sponsors a car driving event for clients. This type of event is often referred to as an HPDE, or High Performance Driving Event. At this event, guests participate in both classroom and on race track driving instruction. [...]

Alvaka Networks Speed and Feed Driving Events2020-03-27T17:29:46-07:00

To patch or not to patch? And what is patching anyway?

If you own a computer, it is very likely you know something about patching, or updating, software. First, this is different from upgrading, which usually means a developer of software has added new features or made significant changes to the [...]

To patch or not to patch? And what is patching anyway?2020-02-04T01:51:36-08:00