Security on the Wire
Network Security Intelligence from the Exfiltration Experts
Law Enforcement Case Study
Distance Per Network Hop Technical Report
This is a technical data analysis of physical distance per network hop done for Hopzero.Peter Mullarkey, PhD, Hopzero and RedRunGroupVersion 2.0 Motivation Having a basic understanding of the physical distance between network hops can provide insight to a company’s...
What Does HOP Count Mean? (and Other Important HOP Questions Answered)
If you’re involved in IT, you’ve probably heard of HOPs. But you might have asked yourself: What does HOP count mean? And why should you care?
4 Cyber Security Trends for 2020 to Keep an Eye On
While it’s nearly impossible to predict the future, here are four key cyber security trends for 2020 we think every infosec professional should keep tabs on.
Keeping Data on a Short Leash to Avoid Breaches
Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise? Another dog? Dogs...
HOPZERO Selected as “EMA Vendor to Watch”
Enterprise Management Associates (EMA) is a leading voice in the information security industry. With its dedication to in-depth research — and unrivaled analysis — the EMA is an important resource for data management and IT professionals anywhere. That's...
What’s on the Inside Can Be as Dangerous as What’s on the Outside
Chinese Army purportedly inserted chips to provide hackers a connection into the back-end infrastructure where they can steal information and credentials.
HOPZERO Partners With Incubator CTX for Good Cause (and Industry Insights)
HOPZERO & Incubator CTX performed a survey of the enterprise security industry. Most participants opted to donate to Water to Thrive than take a gift card.
Remembering 9/11: “Being Ready for the Call”
As we move closer to another anniversary of 9/11, I'm reminded of the opportunity my team and I had, just days after the attack, to serve my country by assisting with communication recovery for a besieged Pentagon.It was an experience I'll never forget. (The VIDEO...
What the IPSec Hack Can Teach Us About One-Layer Cyber Protection
Even the most comprehensive cyber defense system can still be vulnerable when dependent on a single layer of cyber protection.
[VIDEO] Everything You Always Wanted to Know About HOP Counts in Networking
A short animation laying out how hops and networking relate to each other and give you the intel needed to achieve visibility of your most precious data.
CGTN America: HOPZERO Part of “New Silicon Valley”
Why do entrepreneurs choose to live in one state and not another? Is Silicon Valley the "only" viable tech hub? Or are places such as Austin, Texas and Columbus, Ohio positioning to be major players in the next phase of technological innovation? These are some of the...
eWeek: “HOPZERO and ‘Mission Impossible’ – Where Data Self-Destructs”
Your mission, should you choose to accept it, is to find out how HOPZERO’s approach to cyber security is like a Mission: Impossible message…
Three Network Security Concepts Every Organization Should Utilize in 2018
It’s important, as infosec professionals, we keep abreast of the latest network security trends for 2018. Here are three network security concepts to consider.
[RADIO INTERVIEW] Bill Alderson on the Potential of Proximity Security
Bill Alderson chats with Bret Piatt about the perils of server default configurations and GeoIP firewall settings, plus the future of network security.
Are Half of All U.K. Manufacturers the Victims of Cyber-Crime?
Most British manufacturing companies believe cyber-related attacks are likely to only “deepen and broaden with increasing digitization.”
What the GDPR Means for the Future of Network Security
Today I was looking at the agenda for RSA, this nation's biggest security conference. Not surprising, there are numerous sessions on the General Data Protection Regulation (GDPR), a sweeping act aimed at protecting private information for European Union (EU)...
Is Proximity-Based Security Our Last Line of (Cyber) Defense?
Cyber-crime is irrefutably on a massive rise, and our existing security tools are proving woefully unable to keep our data safe from hackers.
How to Avoid the ‘Mousetrap Syndrome’ of Network Security
How do we protect our data? It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams. We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like...
Why Does Your Server Speak Russian?
We all know how firewalls work; they prevent packets from passing through self-imposed barriers. But they don't limit how far packets go once they pass the threshold. The big question many U.S. organization database managers need to ask themselves is: is my...
“The Curious Case of Don Draper and the Mysterious TCP Reset”
It is interesting to think about what Don Draper, the famed creative director on AMC’s Mad Men (played by Jon Hamm), would do in the 21st-century if his advertising firm’s delivery of time-sensitive media were disrupted. How would he handle cyber-crime and other...
“It’s Not You; It’s Me”: Network Protection From the Inside-Out
Every enterprise network uses firewalls to restrict incoming traffic. These firewalls are amazing pieces of technology, building a powerful wall to keep intruders out — but all the defenses face outward.The soft spots — those areas most vulnerable — come from us,...
Why “Less is More” When It Comes to Network Security
Last week, Dark Reading published an analysis of 2017’s data breaches, and the results were quite bleak. If you follow the news at all, it shouldn’t surprise you that the number of breaches and leaks last year broke a world's record. What is surprising,...
What the Antiquated Bank ATM Can Teach Us About Database Security
The antiquated ATM is an instructive metaphor for understanding the relationship between the web and your organization’s database server.
Is Your Internet Browser Making You Vulnerable to a Hack?
Do you or others in your organization use Google Chrome or Mozilla Firefox browser extensions? Many of us do. Often they have incredibly-useful features, such as ad-blocking, advanced searching, reducing page-load times, and much more. But did you ever wonder if they...
Grey’s Anatomy Hospital Hack: “It’s Getting Hot in Here…”
In its fall cliffhanger episode, ABC Television’s Grey’s Anatomy touched on a vital new issue in our world: cyber terror.(Note: The following contains spoiler alerts for the final episode of the season.)The hospital is panicked as hackers demand millions in ransom to...
Thoughts on the Hawaii Missile Alert
On an otherwise peaceful morning on January 13th, Hawaiian residents and visitors were horrified to receive a warning on their mobile phones instructing them to “seek immediate shelter” due to an imminent missile attack. The message ended with the simple, yet...
Does Your Golden Goose Server Stick Its Neck Out?
Takeaways: Many Back-end “Golden Goose Servers” do Connect to the Internet Firewalls are not the end-all protection they are made out to be It’s dangerous (and expensive) to let your “Golden Goose Server” connect to the entire world A “Golden Goose Server” is a device...
How to Keep Your Server Safe (and Your To-Do List Manageable)
Crown Jewel Servers are packed with industry secrets, financial data, private client information, and usually are unnecessarily unsecure.
[VIDEO] Do You Know Where Your Data is Right Now?
The most effective network security solution isn't about building the most impregnable firewall. It's about limiting the distance your data can travel after it passes the firewall. Stop hackers by denying them an opportunity to connect or even get a...
What Could Have Stopped the Most Recent Data Breach?
Takeaways: Prevention is more effective than cure when it comes to network security. Security obviation stops hackers at the source A HOP value limits the amounts of hops that a server takes. It’s a question every consumer and information professional asks...
Legacy Server Security Measures: When Firewalls Fail
Takeaways:Legacy servers, those too cumbersome or expensive to replace, don’t have to be vulnerable to cyber-attack when firewalls fail to protect.Not all firewalls are created equal. In fact, as recent Cisco announcements proved, many firewalls are no longer...