Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 days ago

New blog articles detected

  • Data Breaches: Don’t Put Your Brand at Risk

    Risk management and cyber security analysts have focused on the substantial costs of data breaches for some time. In a 2016 report, Ponemon Institute reported that the average total cost of a breach rose from $3.8 million to $4 million, with the per-record cost rising from $154 to $158. Naturally, companies have taken note of ... The post Data Breaches: Don’t Put Your Brand at Risk appeared first ...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Wanted: Employees Willing to Steal Data

    Insider threats are hardly a new problem. As companies increasingly rely on data connected to complex networks, they also rely on their employees to make sure that data stays out of the wrong hands. The trouble is, unlike the hackers lurking outside the corporate network, insiders can directly access sensitive information and critical systems without ... The post Wanted: Employees Willing to Steal...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • A Simple Cyber Security Plan Is the Best Kind of Plan

    In the past few years, enterprise networks have quickly grown in complexity, spurred by demand for bring-your-own-device (BYOD) policies, cloud computing and virtualization, among other factors. Unsurprisingly, this increased complexity has called for new cyber security considerations, as firms work to maintain the protection of their sensitive data. However, if you think the complexity of ... The...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • Get Ready for Updated NIST Compliance Requirements

    Like so many areas of the American political system, federal cyber security regulation is in a period of transition. Some of the change is an effect of the presidential handoff to an administration with a markedly different agenda from the previous one. But an even greater driver has been the failure of some government agencies ... The post Get Ready for Updated NIST Compliance Requirements appear...

  • The Top Cyber Security Threats in 2017

    Before leaving the White House, President Obama has sought to make defense from cyber security threats a national priority for the near future, proposing a 35% increase in budget ($19 billion) for cyber defense in 2017. As news stories of election hacks and record-breaking data breaches dominate headlines, it should be no mystery to anyone ... The post The Top Cyber Security Threats in 2017 appear...

  • Lunarline’s Top 5 Blog Posts of 2016

    We can all agree that 2016 was a big year marked by some big surprises. In several countries, voters ushered in unexpected changes, enacting dramatic sea changes in their nations’ politics. America’s election resulted in an upset victory for Donald Trump. In sports, the Chicago Cubs won their first World Series since 1908, and the ... The post Lunarline’s Top 5 Blog Posts of 2016 appeared first on...

  • Cyber Security Maturity is Not Measured in Pages

    If you want to understand maturity, watch a jazz concert. Much of what you hear is improvised, right there before your eyes. The music you hear is so well integrated, it seems that it’s already been planned. But in fact the musicians are making it up as you watch. How? They are following a set ... The post Cyber Security Maturity is Not Measured in Pages appeared first on Lunarline Blog.

  • Your Cyber Security Training Plan for 2017

    There are only a few days of 2016 left. We wave goodbye to a year that has, yet again, placed issues of cyber security at the center of the nation’s attention. Even now, Russian hackers, after their suspected attempts to influence the 2016 election outcome, are grabbing top headlines. Meanwhile, Yahoo attempts to rebound from ... The post Your Cyber Security Training Plan for 2017 appeared first o...

  • Will FedRAMP Accelerated Save CSPs Money?

    In September, the FedRAMP Program Management Office (PMO) published an article, which addressed the costs associated with going through FedRAMP. The price came out to an average cost of $3,250,000. This cost includes work hours and component costs for engineering the system, developing system documentation, the 3PAO assessment of the system, FedRAMP JAB review and ... The post Will FedRAMP Acceler...

  • Safe Travels: How to Protect Your Home During the Holidays

    In the classic Christmas movie Home Alone, the precocious Macaulay Culkin had his hands full protecting his home from two bumbling burglars, Harry and Marv. It was the good old days, when life was simpler and technology had not yet ruined the nostalgia of old-fashioned stake-outs: The pair would spend the days leading up to ... The post Safe Travels: How to Protect Your Home During the Holidays ap...

  • Cyber Security Insurance Is No Excuse for Poor Security

    Data has become so valuable and so critical to businesses that often, it is a company’s most protected asset. If a data breach were to happen today, it likely will have far-reaching consequences. These range from steep legal fees and regulatory fines, to intellectual property loss and reputation damage. The costs can be devastating, and ... The post Cyber Security Insurance Is No Excuse for Poor S...

  • What Donald Trump Must Do to Improve Cyber Security

    The 2016 presidential election took more than a few people by surprise. But shocked or not, the result is the same: Donald Trump will take office in January, representing a major shift in American politics. If we take the president-elect at his word, much of the policy President Barack Obama and his administration enacted over ... The post What Donald Trump Must Do to Improve Cyber Security appear...

  • Do You Speak Security? 10 Cyber Security Terms You Need to Know

    Unless you work in the IT department, you probably haven’t had to know much about cyber security. Still, while you may not know how to chase off hackers, as cyber security becomes a crucial risk management concern for your company and others, you’ll need to understand it. The world of cyber security can feel foreign ... The post Do You Speak Security? 10 Cyber Security Terms You Need to Know appea...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Hacking the Heartland (Part 3): Safeguarding Farming Data

    Drive through any stretch of American farmland, and you’ll see miles of reinforced fencing that protects crops and keeps out unauthorized visitors. It’s clear that security is a high priority at these critical purveyors of the U.S. food supply — and, of course, that’s for good reason. However, in an increasingly data-centered world, U.S. farms ... The post Hacking the Heartland (Part 3): Safeguard...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Risk Management – From Paper to Reality

    So you have completed your security controls assessment. You have beautiful risk assessment reports, and a big beautiful plan of action and milestones (POA&M). Now what? You have to bring your plan to manage risk into reality. According to the Department of Homeland Security’s Office of Cybersecurity and Communications, if you stacked all of the ... The post Risk Management – From Paper to Reality...

  • Hacking the Heartland (Part 2): Farming Intellectual Property

    Having your trade secrets hacked is never a good thing, but there are certain areas within the U.S. economy where a hacked trade secret could lead way to an absolute disaster. One of those industries that many people don’t typically associate with highly sophisticated technology: agriculture. Nonetheless, the ag industry is currently a top concern ... The post Hacking the Heartland (Part 2): Farmi...

  • Cyber Security: If You Don’t Know the Mission, You Don’t Know the Risk

    Like the good cyber security stewards we are, we regularly inventory our assets, assess known vulnerabilities, and stay abreast of the latest threat intelligence. So we know our risk, right? Not necessarily. When assessing risk, many cyber security professionals think of the technological impact, such as webserver downtime or the inability to deliver email. The ... The post Cyber Security: If You ...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Are You Ready for the New FedRAMP Readiness Capabilities Assessment?

    With the final release of the FedRAMP Readiness Assessment Report (RAR) template earlier this month, there is a new assessment process that will greatly impact cloud service providers (CSPs). As part of the FedRAMP Accelerated initiative, CSPs working towards a FedRAMP JAB P-ATO must achieve a FedRAMP-Ready status based on the Readiness Capabilities Assessment performed ... The post Are You Ready ...

  • Hacking the Heartland: Old MacDonald Got Hacked (Part 1)

    What kind of imagery does the term “cyber security landscape” conjure up for you? Chances are, it’s not the wide-open, rolling fields you see on farmlands. In fact, that is the kind of scenery you’d expect to be far removed from the world of hackers and complicated data networks. But it’s precisely this setting where ... The post Hacking the Heartland: Old MacDonald Got Hacked (Part 1) appeared fi...

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 5 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 5 months ago

Lunarline, Inc

Category: Content
Type: Blog Article

Generated 6 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in