Warning: Undefined property: WP_Post_Type::$post_title in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(222) : eval()'d code on line 9
Warning: Undefined property: WP_Post_Type::$ID in /var/www/factionnetworks/wp-content/themes/bricks/includes/elements/code.php(222) : eval()'d code on line 10
Blogs
The Internet Cannot be Defended from the PRC
Reading Time: 4 min.
The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of the APT 40 unit of the PRC. This is just confirmation of what we already know – and was addressed by both FBI Director Christopher Wray and NSA Chief General Timothy Haugh in testimony to congress this summer. But now…
KISS: Keep It Simple Security
Reading Time: 7 min.
Faction Networks changes the paradigm and enables K.I.S.S. by going back to the foundation of actually securing networking, and then building up from there a simple but comprehensive tool set to protect our connections, devices and data. Here is how.
The System is Blinking Red
Reading Time: 6 min.
The “Good Enough” strategy in Cyber Security is not going to cut it any more. The time frame here is anybody’s guess. 3 months? 3 years? But it is clear and obvious that massively disruptive cyber attacks await us unless we change our mindset and approach.
5 Easy Cybersecurity Steps to Radically Reduce Your Risk NOW
Reading Time: 9 min.
For most small to mid-sized business owners, just keeping business and operations running is the primary concern. When one looks at all of the potential threats, and all of the steps that are required to implement a complete and rigorous cybersecurity defense, it can be very hard to know where to start. Here is a simple guideline for the 5…
Alert: Two major flaws expose WiFi networks to attack, affects billions of users
Reading Time: 5 min.
Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…
How Could This Happen?! A Deep Dive into the Change Healthcare Attack
Reading Time: 11 min.
It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…
Not Just ‘Factories’ – 40% of Food & Beverage Manufacturers Impacted by Ransomware Attack
Reading Time: 1 min.
JSB Foods ransomware incident just a prominent example According to Claroty, more than 40% of food and beverage-sector respondents had…
Why a 2nd Class Air National Guardsman Could Read the Pentagon’s Briefings on Ukraine’s War Plan
Reading Time: 3 min.
Most people by now have heard of Jack Teixeira, or if not at least the infamous story of how a…
Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers
Reading Time: 2 min.
Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…
Nobody Would Have Agreed to This
Reading Time: 9 min.
Even George Orwell Could Not Have Imagined the World We Live in Today Let’s Start with a Thought Experiment If…
Android TV Streaming Boxes Riddled with Backdoor Malware
Reading Time: 1 min.
Well, this one certainly wins the prize this week! Wired Magazine published a round-up of multiple cybersecurity researchers and the…