Blog
The Internet Cannot be Defended from the PRC
The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General Timothy Haugh in testimony to congress this summer. But now…

KISS: Keep It Simple Security
Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then building up from there a simple but comprehensive tool set to protect our connections, devices and data. Here is how.

The System is Blinking Red
The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is anybody’s guess. 3 months? 3 years? But it is clear and obvious that massively disruptive cyber attacks await us unless we change our mindset and approach.

5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW
For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where to start. Here is a simple guideline for the 5…

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…
How Could This Happen?! A Deep Dive into the Change Healthcare Attack

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…
Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack

JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…
Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan

Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…
Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…
Nobody Would Have Agreed to This

Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…
Android TV Streaming Boxes Riddled with Backdoor Malware

Well, this one certainly wins the prize this week! Wired Magazine published a round-up of multiple cybersecurity researchers and the…