Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.
0 Comments

Researchers at MIT Identify Security Vulnerabilities in Voting App

The expansion of mobile technology in recent years has come with several amenities. It has also generated popular slogans like “there is an app for that.” These two notions have produced the idea of using mobile applications to complete practical activities such as voting.

Anything that can get hacked, will get hacked. This is why voting security experts have warned that paper ballots are the only secure method to vote.

Read More
0 Comments

Active Cyber Defense Certainty Act, What does it mean?

The want and need to keep a company's data private is universal, but cyber criminals are constantly trying to gain access to that data. To better protect our nation from malicious hackers, government representatives have proposed offensive measures that companies can take in the case that a hacker steals private information.

Read More
0 Comments

Say "Farewell" to Windows 7

With major support having ended for Windows 7, companies and end/home users who continue to rely on Windows 7 may be at risk. Microsoft announced that as of January 14th of 2020, they will no longer be pushing security updates for Windows 7, which are meant to cover new and existing vulnerabilities. With these updates no longer being pushed out for that operating system, there is an increased risk that some new vulnerabilities will be found and exploited. These vulnerabilities may cause loss of data or even allow for the creation of back doors for hackers to leave malicious malware on existing systems.

Read More
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 3

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses retaining the professionals you’ve hired.

Read More
0 Comments

LA Cyber Lab - 2019 Security Summit

The Department of Homeland Security and City of Los Angeles formed the LA Cyber Lab, a joint initiative to help protect Los Angeles based companies from cyber attack.  Last week, the LA Cyber Lab hosted Security Summit 2019 to spread awareness of cyber threats and share information within the business community.  This two-day event had over 500 registered participants and covered a wide range of cybersecurity and threat intelligence topics.  Silent Sector Partners, Michael Rotondo and Zach Fuller, presented in a panel forum focused on the idea that cybersecurity expertise is far more important for preventing cyber attacks than security tools.
Read More
0 Comments

Develop.Idaho Conference - Incident Response Panel

The Idaho Technology Council hosted Develop.Idaho, a world-class event full of thought leaders and innovators in industries ranging from self-driving cars to AI driven software as a service.  Silent Sector Partner, Lauro Chavez, presented on the topic of cyber incidents in a panel forum called, "Cyber Forensics: Is Your Technology Leaving a Trail to Follow?"
Read More
0 Comments

Capital One Breach - What Happened?

Big brands get big publicity after a breach and Capital One is no exception.  However, mainstream media is known to sensational the story rather than taking an objective look at what happened.  The following is our opinion based solely on publicly available information and is not the opinion of Capital One or any related parties.
Read More
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 2

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses finding and hiring IT and security professionals.

Read More
0 Comments

An Overview of BlueKeep (CVE-2019-0708)

In early May of 2019, Microsoft reported that a new security vulnerability had been discovered and could be a tremendous threat to their users. The bug was originally detected by the United Kingdom’s National Cyber Security Centre. Officially tracked “CVE-2019-0708”, but referred to as “BlueKeep”, this exploit is a remote code execution vulnerability that is present in Remote Desktop Services.

Read More
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 1

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses compensation.

Read More