Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link or…
Please enjoy our newest podcast, the Weekly Security Sprint, on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor link or…
Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well as other locations accessible via the Anchor…
WaterISAC Announcement Contact: Kaitlyn Palatucci Phone: 202-420-9343 Email: palautcci@waterisac.org WASHINGTON, D.C., JULY 6 — WaterISAC welcomes its newest Champion, Gate…
As everyone knows, the COVID-19 pandemic has upended many things that we all took for granted. Our Gate 15 team…
By Andy Jabbour This is an update to the original post, The SUN also rises… (a peek into Gate 15),…
By Jennifer Lyn Walker, The Cybersecurity Evangelist Please enjoy this month’s episode of The Gate 15 podcast on Anchor, Spotify, Apple, Google, as well…
By Andy Jabbour This is 100% a personal opinion but one I find myself sharing in a number of forums…
Encryption. In today’s world, it is a vital part of privacy and security, and should be a part of protecting…
On 23 Sep, the National Council of ISACs (NCI) “hosted a Congressional briefing on to highlight the critical role Information Sharing and Analysis…
By Jennifer Lyn Walker If you have experienced a cyber incident and never determined the actors’ initial access vector, chances…
By Andy Jabbour This is a small update to a post shared a year ago, “The SUN also rises… (a…
By Andy Jabbour Elections are inherently divisive, and (if you listen to the rhetoric) each one is “the most important…
By Andy Jabbour In establishing Gate 15, one area I hoped to develop was the idea of service. As a…
By Mayya Saab National Preparedness Month is recognized each September to promote family and community disaster as well as emergency…
In this update on threats that are neither entirely comprised of physical or cyber parts, known as blended and complex threats, we explore their complexities and consequences as they become relevant to the security and resiliency of our critical infrastructure
A webinar for the RE-ISAC by Trend Micro’s Numaan Huq and Stephen Hilt, and a panel discussion including Numaan, Stephen and Gate 15’s Jennifer Walker.
We use the term blended and complex threats to account for threats that operate within and cross-over physical and cyber boundaries. This post includes examples of the terms above contextualized in recent incidents and vulnerabilities.
Three simple things that anyone can to do to maintain reasonable password security.
By Omar Tisza As cyber-adversaries become sophisticated in their attacks against critical infrastructure, we see the level of sophistication between…
By Mayya Saab This January, our team gathered for one of our too infrequent in-person all-hands huddles. Among the other…
By Omar Tisza In our quest to continue exploring salient examples of complex and blended threats, we have complied a…
I often get asked, “what is Gate 15” or “what does that mean?” A lot of folks assume it has…
by Andy Jabbour Too many cookies, another Detroit Lions loss, and a slew of predictions for next year… it…
By Omar Tisza Cyber threats are increasingly gaining the full attention of industry and–most recently–government as the Department of…
By Andy Jabbour Eleven months ago, I wrote: Following the House of Representatives, the US Senate needs to approve…
Over the course of this year, our team has shared a number of posts regarding blended and complex threats. As…
By Bridget Johnson A federal judge delivered a pointed criticism of how the corrections system deals with jihadism when…
“If you don’t immediately stop the clearing of the Hambach Forest, we will attack your servers and bring down your…