Unlimited Technology is honored to have moved from #9 to #7 on the SDM Top System Integrators List. With the unique challenges that 2020 brought, we are proud of the entire Unlimited Team. Your determination allowed us to provide industry leading security services to our clients during this unprecedented time. As the security landscape changes and technology needs are shifting, …
Jeremy Reich of Unlimited Technology Celebrated by SSN “40 Under 40”
As Unlimited’s General Counsel, Jeremy is a valuable member of the Unlimited leadership team and has been vital to Unlimited’s success by providing practical business minded guidance and advice at all levels of the organization. Take a look at the article featuring Jeremy below to learn more about his career at Unlimited Technology and his holistic approach to security.
Cyber Wednesday Info Byte #35
Cybersecurity is still in it’s infancy as an academic discipline. The Cybersecurity and Infrastructure Security Agency (CISA) developed the Cybersecurity Workforce Training Guide as a resource to help professionals and organizations understand the Work Roles, Tasks, and Knowledge, Skills, and Abilities (KSAs) of the various, and highly divergent, specialties of this field. This guide is a tool you can use …
Cyber Wednesday Info Byte #34
In 2014 NIST was tasked with creating a “prioritized, flexible, repeatable, performance-based, and cost-effective approach” for critical infrastructure to help identify, assess, and manage cyber risks. The NIST Cybersecurity Framework (CF) revolves around 5 key functions. Identify, Protect, Detect, Respond, Recover. “Organizations will continue to have unique risks – different threats, different vulnerabilities, different risk tolerances. They also will vary …
Cyber Wednesday Info Byte #33
Cyber Resiliency is the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems. Our friends at NIST have a released a draft of “Developing Cyber-Resilient Systems: A Systems Security Engineering Approach”. This document focuses on cyber resiliency engineering, an emerging specialty systems engineering discipline. “Numerous reports of cyber incidents and cyber breaches …
Cyber Wednesday Info Byte #32
The May 12th Executive Order on Improving the Nation’s Cybersecurity directed our friends at NIST to publish guidelines on vendors’ source code testing. As a result NIST recently published Guidelines on Minimum Standards for Developer Verification of Software. An excellent resource for organizations that develop software in-house, it is also useful for organizations that want to practice due care when …
Cyber Wednesday Info Byte #31
On July 15th the US government released a new website that is the result of an inter-agency “whole-of-government” effort to curb the rise of ransomware cases. This new website is a “one stop shop” for preventing, detecting, reporting, and recovering from ransomware. StopRansomware.gov is an excellent resource for all organizations. “CISA is developing a catalog of Bad Practices that are …
Cyber Wednesday Info Byte #30
Our friends at MITRE have developed a new cybersecurity framework! The D3FEND framework is intended to improve the security of DoD systems by offering a catalog of defensive countermeasures against common attack techniques. Funded by the National Security Agency, this framework is a defensive counterpart to the ATT&CK framework. “Kill-chain oriented and derived threat models have proved popular and effective. …
Cyber Wednesday Info Byte #29
Recent events involving the scraping of personal information from social media sites such as the Facebook Leak and LinkedIn Leak should give us all pause to re-evaluate what we consider to be private information. Once data points such as cellphone number, personal email address, and birthday are collected and released in public data sets there is no way to make …
Cyber Wednesday Info Byte #28
Many of the recent high profile cybersecurity incidents have something in common: stolen credentials are used to gain remote access through a VPN solution that is not protected by multi-factor authentication. Mult-factor authentication prevents attackers with stolen credentials from gaining remote access by challenging the user to provide additional information such as biometric data or TOTP tokens. “The authentication factors …
Cyber Wednesday Info Byte #27
An information security program requires buy-in at the highest levels of the organization. The recent SOLARWINDS and HAFNIUM attacks are a stark reminder that the cyber threat landscape is quickly evolving, but resilient organizations with robust and unified strategies persevere. The Department of Homeland Security (DHS) has created a guide for leadership discussions about cybersecurity risk management. “Cybersecurity is NOT …
Cyber Wednesday Info Byte #26
Positioning, Navigation, and Timing (PNT) services such as Global Positioning System (GPS) or Network Time Protocol (NTP) are a critical part of every organization. The impact of a disruption of such services can range from being subtle errors that accumulate over time to complete failure of critical business functions. Our friends at NIST have assembled the tools that you need …