Accessibility Statement Skip Navigation
  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing
  • Login
  • GDPR
  • Create a Free Account
Return to PRWeb homepage
  • News
  • Resources
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace, Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads and Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking and Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers and Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalization
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls and Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil and Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defense
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation and Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking and Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers and Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines and Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics and Personal Care
      • Fashion
      • Food & Beverages
      • Furniture and Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewelry
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks and Tourist Attractions
      • Gambling & Casinos
      • Hotels and Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Advocacy Group Opinion
      • Animal Welfare
      • Congressional & Presidential Campaigns
      • Corporate Social Responsibility
      • Domestic Policy
      • Economic News, Trends, Analysis
      • Education
      • Environmental
      • European Government
      • FDA Approval
      • Federal and State Legislation
      • Federal Executive Branch & Agency
      • Foreign Policy & International Affairs
      • Homeland Security
      • Labor & Union
      • Legal Issues
      • Natural Disasters
      • Not For Profit
      • Patent Law
      • Public Safety
      • Trade Policy
      • U.S. State Policy
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Hamburger menu
  • Cision PRWeb provides efficient communication tools to continuously engage with target audiences across multiple online channels
  • Create a Free Account
    • ALL CONTACT INFO
    • Contact Us


      11AM ET Sunday – 8PM ET Friday

  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR

Last Week’s Hacker Conventions Showcased the Acceleration of New Threat Vectors & Cyber Vulnerabilities
  • USA - English


News provided by

Global Digital Forensics

Aug 06, 2013, 04:30 ET

Share this article

Share toX

Share this article

Share toX

All kinds of data can put you at risk if it lands in the wrong hands
All kinds of data can put you at risk if it lands in the wrong hands

New York, NY (PRWEB) August 06, 2013 -- It’s only natural for cyber-paranoia to creep in when surrounded by some of the world’s best hackers, so there was undoubtedly a lot of that going around last week at the famous annual hacker conventions in Las Vegas, DEF CON and Black Hat. But, as Bob Knudsen, Northeast Regional Manager of Global Digital Forensics says, “it’s certainly not irrational paranoia, it’s anchored real life experiences that make headline news stories all the time, a lot of them really scary stuff. The question is, what are today’s organizations doing to fight those fears?”

To chart a course to where you want to be, you first have to know where you are. Improving your cyber security posture is absolutely no different.

Post this

Who and what is at cyber risk?

“The short answer is just about everyone, and increasingly, just about everything. The cornerstones of the hacker world are still there concerning networks, like the theft of intellectual property, malicious payloads meant to infect, infiltrate and/or paralyze organizations, stealing Personally Identifiable Information (PII), and a host of other threat vectors everyone is by now familiar with. But now, as technology seeps in to every little nook and cranny of our lives, we’re getting into a stage where things we never thought about getting hacked are also on the menu. Now we have to worry about televisions and gaming systems becoming conduits for cyber espionage, we have to worry about on-board electronics in our vehicles getting hacked and manipulated to the point of possibly becoming dangerous, and we even have to worry about having our electronic medical implants hacked and manipulated,” like renowned hacker Barnaby Jack, who dropped jaws a few years ago by getting an ATM to start spitting out money at the Black Hat conference, was set to demonstrate this year in Las Vegas before his untimely and still mysterious death a little over a week ago. Undoubtedly, the fact that he was about to reveal a cyber-vulnerability which could actually end the life of a real person with a cyber-attack is more than enough fuel to get the gears of conspiracy theorists everywhere going full bore.

Splash the Zeroes … and ones.

“If DEF CON and Black Hat proved one thing, it’s that the craft of hacking never stands still, and neither can the wheels of cyber security, or it will never be a fair fight. Think of it this way. Years ago, or should I say decades, there was a movie called The Final Countdown. The premise of the story was that the USS Nimitz, a modern nuclear powered aircraft carrier, was launched back in time to the days right before the Japanese sneak attack on Pearl Harbor. The storyline of course was hinged on the moral and ethical dilemma of whether or not use their modern technology to change history and the paradox repercussions that could be unleashed if they decided to flex their tech-muscles to change the outcome of an event that changed the world at the time. It would have been F15s at Mach 2 against propeller powered Zeroes, guided missiles against bullets and a sitting duck fleet, all the while being armed with the knowledge of history and knowing exactly what was about to take place, when and where. Essentially, the Japanese fleet would have stood no chance against 40 years of advancements in technology, like when it took just seconds between a ‘splash the Zeroes’ order going out over the radio, to the conformation of ‘two Zeroes splashed’ coming back. They had no chance. But that’s the kind of lopsided fight that unfolds every day in the cyber realm. There are still national infrastructure entities out there relying on SCADA (Supervisory Control and Data Acquisition) systems implemented decades ago, there are still businesses relying on technology that is so out of date it’s like a wide open door to today’s hackers, there are still organizations and institutions out there relying on cyber security plans developed and instituted years ago. And if you need a more real and modern example, just think back to the paralyzing hubbub the Y2K scare caused over a something as simple as incorrectly coded date fields that didn't account for the future. Yesterday’s programmers may have been living on the cutting edge of technology, but that edge gets duller and duller as time passes and technology evolves. So to survive on today’s cyber battlefield, it has never been more important to step at least into the present, but always with both eyes squarely fixed the future. That’s what we help clients do, survive and thrive in today’s landscape of zeroes and ones.”

How to stand tall against the relentless threat.

“To chart a course to where you want to be, you first have to know where you are. Improving your cyber security posture is absolutely no different. Regular cyber threat assessments and comprehensive penetration tests are more important than ever, and ours are designed to do just that, let you know where you stand, where you’re weak, and what needs to be focused on to stand up to today’s cyber threats which are lurking around every corner. A cyber security plan from five years ago probably doesn’t focus at all on threat vectors posed by smartphones and tablets, but they are definitely part of the equation today. Applications designed or purchased just a few years ago may not be up-to-snuff security-wise by today’s standards, and the plethora of cloud-based applications and SaaS (Software as a Service) platforms which have popped up over the last couple of years can pose problems that are most likely not even on the radar of outdated cyber security plans, but they can certainly have grave consequences if exploited. From the big picture, to all the intricacies and details of a client’s unique digital architecture and cyber functionality, including regulatory compliance issues, we shine a spotlight on their weaknesses and help them significantly improve their cyber security posture. Unfortunately, the only thing we can’t do is pick up the phone for them to make the call that gets us started. But even if they waited too long and already got victimized, we have emergency cyber incident responders standing by 24/7, ready to spring into action to take control of the situation and dramatically reduce the consequences and aftermath that inevitably follow a successful cyber-attack, intrusion or breach.”

*Global Digital Forensics is a recognized industry leader in the fields of computer forensics, electronic discovery (eDiscovery), cyber security and emergency incident response, with years of experience assisting clients in the government, banking, healthcare, education and corporate arenas. For a free consultation with a Global Digital Forensics specialist, call 1-800-868-8189 about tailoring a plan which will meet your unique needs. Emergency responders are also standing by 24/7 to handle intrusion and data breach emergencies whenever and wherever they arise. Time is critical if a cyber-incident has occurred, so don’t hesitate to get help. For more information, visit http://www.evestigate.com.

Aris Demos, Global Digital Forensics, http://www.evestigate.com, +1 (800) 868-8189, [email protected]

Modal title

Contact PRWeb

  • 11AM ET Sunday – 8PM ET Friday
  • Contact Us

About PRWeb

  • About PRWeb
  • Partners
  • Partnership Programs
  • Editorial Guidelines
  • Resources

Why PRWeb

  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing

Accounts

  • Create a Free Account
  • Log in
  • Contact Us

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921

Contact Cision

Products

About

My Services
  • All News Releases
  • Online Member Center
  • ProfNet
Cision Distribution Helpline
888-776-0942
  • Legal
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 Cision US Inc.