by Gate 15 | Jun 25, 2018 | Uncategorized
By David Pounder Threats operate in all shapes and sizes, and whether by design or not they tend to follow a common process, which can be identified as the Hostile Events Attack Cycle. Whether it is a physical attack designed to inflict mass casualties or an attack on...
by Gate 15 | Jun 11, 2018 | Uncategorized
A recent post introduced the preparedness efforts that the Research and Education Network Information Sharing and Analysis Center (REN-ISAC) is taking to promote threat awareness, security coordination, and preparedness across the REN-ISAC and Higher Education...
by Gate 15 | May 25, 2018 | Uncategorized
It is rare that the US Government asks everyone to do something, and it can be challenging to get that word out. The following was recommended by the FBI in a Public Service Announcement (PSA) today, 25 May 2018, in response to dangerous malware: The FBI recommends...
by Gate 15 | Mar 22, 2018 | Uncategorized
By David Pounder On 14 February, a former student entered Stoneman Douglass High School in Parkland, Florida and killed 17 students and school officials. While there have been varying statistics and arguments about the actual number of school shootings in 2018...
by Gate 15 | Mar 6, 2018 | Uncategorized
By Brett Zupan and Andy Jabbour Across critical infrastructure, organizations must continually reassess their risks based on an ever-changing threat environment. In doing so, and as part of broader risk management activities, our team encourages applying a...
by Gate 15 | Mar 1, 2018 | Uncategorized
By Andy Jabbour This is an update to the original post, “Terminology for $500. What Are Blended Attacks?” 26 May 2017, and the update, “Blended Threats: Understanding an Evolving Threat Environment,” 24 Jan 2018. As our team continues projects...