Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 3

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses retaining the professionals you’ve hired.

Read More
0 Comments

LA Cyber Lab - 2019 Security Summit

The Department of Homeland Security and City of Los Angeles formed the LA Cyber Lab, a joint initiative to help protect Los Angeles based companies from cyber attack.  Last week, the LA Cyber Lab hosted Security Summit 2019 to spread awareness of cyber threats and share information within the business community.  This two-day event had over 500 registered participants and covered a wide range of cybersecurity and threat intelligence topics.  Silent Sector Partners, Michael Rotondo and Zach Fuller, presented in a panel forum focused on the idea that cybersecurity expertise is far more important for preventing cyber attacks than security tools.
Read More
0 Comments

Develop.Idaho Conference - Incident Response Panel

The Idaho Technology Council hosted Develop.Idaho, a world-class event full of thought leaders and innovators in industries ranging from self-driving cars to AI driven software as a service.  Silent Sector Partner, Lauro Chavez, presented on the topic of cyber incidents in a panel forum called, "Cyber Forensics: Is Your Technology Leaving a Trail to Follow?"
Read More
0 Comments

Capital One Breach - What Happened?

Big brands get big publicity after a breach and Capital One is no exception.  However, mainstream media is known to sensational the story rather than taking an objective look at what happened.  The following is our opinion based solely on publicly available information and is not the opinion of Capital One or any related parties.
Read More
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 2

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses finding and hiring IT and security professionals.

Read More
0 Comments

An Overview of BlueKeep (CVE-2019-0708)

In early May of 2019, Microsoft reported that a new security vulnerability had been discovered and could be a tremendous threat to their users. The bug was originally detected by the United Kingdom’s National Cyber Security Centre. Officially tracked “CVE-2019-0708”, but referred to as “BlueKeep”, this exploit is a remote code execution vulnerability that is present in Remote Desktop Services.

Read More
0 Comments

How to Hire and Retain Qualified Cybersecurity Professionals - Part 1

The below commentary is an excerpt from a longer white paper being produced by the Silent Sector team on how to hire and retain quality security, and by extension, IT resources.  This excerpt addresses compensation.

Read More
0 Comments

Guilty Until Proven Innocent: How effective leaders think about cybersecurity

Cyber-crime is here to stay. Neither technology, compliance frameworks, nor government regulation will stop the threat.  It is a fight we didn’t choose but has forced business leaders to take new measures to protect their organizations. 

Read More
0 Comments

Light Years Beyond the Penetration Test

Penetration testing is now a permanent requirement in most governance frameworks from NIST to PCI DSS, making it a mandatory step in the annual budgets and operations. While most understand a penetration test is necessary in order to meet their client and regulatory requirements for the year, there is little knowledge on what these tests actually accomplish for the organization and how they are conducted.  In addition, an industry-wide consensus of what defines a true penetration test does not exist, creating further confusion. 

Read More
0 Comments

Tools, Tools, and More Tools...

The proliferation and race to market for newer, better, and more stable security tools has thoroughly saturated the IT world. Who hasn’t walked through a trade show and seen booth after booth of the latest and greatest tools? 

Read More