Category Archives: Blog

Are Loyalty Programs Worth Your PII?
by Paul Fletcher, Cyber Security EvangelistHere’s a scenario you may be familiar with:I’m in a hurry and I just entered a retail store I’ve never been in before. …

August 27, 2015 //

Read more ›

Honeynet Stats – August 2015
The Alert Logic ActiveIntelligence group operates a number of proactive initiatives to gather information on the threat landscape, one of which is a baiting operation utilizing our global …

August 25, 2015 //

Read more ›

The Lasting Impact of the Ashley Madison Breach
With such diversity of individuals whose information was compromised through the Ashley Madison hack, you have to wonder what the lasting impact of this breach will be. What …

August 20, 2015 //

Read more ›

How the Wassenaar Agreement Affects the Free Exchange of Threat Intelligence
by Paul Fletcher, Cyber Security Evangelist (@_PaulFletcher)The 2013 amendment of the Wassenaar Agreement threatens the free exchange of threat intelligence information internationally. This concept is an example of the naïveté of …

August 20, 2015 //

Read more ›

The Domino Effect of Shared Systems and Data Breaches
The University of California, Los Angeles (UCLA) Health System, Community Health Services (CHS), Anthem Inc., Premera Blue Cross, the U.S. Office of Personnel Management (OPM), and United Airlines …

August 05, 2015 //

Read more ›