Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Hacking the Heartland (Part 3): Safeguarding Farming Data

    Drive through any stretch of American farmland, and you’ll see miles of reinforced fencing that protects crops and keeps out unauthorized visitors. It’s clear that security is a high priority at these critical purveyors of the U.S. food supply — and, of course, that’s for good reason. However, in an increasingly data-centered world, U.S. farms ... The post Hacking the Heartland (Part 3): Safeguard...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Risk Management – From Paper to Reality

    So you have completed your security controls assessment. You have beautiful risk assessment reports, and a big beautiful plan of action and milestones (POA&M). Now what? You have to bring your plan to manage risk into reality. According to the Department of Homeland Security’s Office of Cybersecurity and Communications, if you stacked all of the ... The post Risk Management – From Paper to Reality...

  • Hacking the Heartland (Part 2): Farming Intellectual Property

    Having your trade secrets hacked is never a good thing, but there are certain areas within the U.S. economy where a hacked trade secret could lead way to an absolute disaster. One of those industries that many people don’t typically associate with highly sophisticated technology: agriculture. Nonetheless, the ag industry is currently a top concern ... The post Hacking the Heartland (Part 2): Farmi...

  • Cyber Security: If You Don’t Know the Mission, You Don’t Know the Risk

    Like the good cyber security stewards we are, we regularly inventory our assets, assess known vulnerabilities, and stay abreast of the latest threat intelligence. So we know our risk, right? Not necessarily. When assessing risk, many cyber security professionals think of the technological impact, such as webserver downtime or the inability to deliver email. The ... The post Cyber Security: If You ...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Are You Ready for the New FedRAMP Readiness Capabilities Assessment?

    With the final release of the FedRAMP Readiness Assessment Report (RAR) template earlier this month, there is a new assessment process that will greatly impact cloud service providers (CSPs). As part of the FedRAMP Accelerated initiative, CSPs working towards a FedRAMP JAB P-ATO must achieve a FedRAMP-Ready status based on the Readiness Capabilities Assessment performed ... The post Are You Ready ...

  • Hacking the Heartland: Old MacDonald Got Hacked (Part 1)

    What kind of imagery does the term “cyber security landscape” conjure up for you? Chances are, it’s not the wide-open, rolling fields you see on farmlands. In fact, that is the kind of scenery you’d expect to be far removed from the world of hackers and complicated data networks. But it’s precisely this setting where ... The post Hacking the Heartland: Old MacDonald Got Hacked (Part 1) appeared fi...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 3 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 3 months ago

Shall we increase our level of intimacy?

40,804,841 ideas and insights to help you find what’s next.

Log in Sign up

Shall we increase our level of intimacy?

40,804,841 ideas and insights to help you find what’s next

Create Free Account

Already a user?  Log in