Don Maclean

Don Maclean

Chief Cybersecurity Technologist, DLT
August 24, 2016
5 Cybersecurity Threat Trends to be Aware of in 2016 premium
Last year, we reviewed threat reports from numerous companies and organizations.  At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion.  These themes are still present a year later, but some new trends have arisen to keep them company. Ransomware is on the […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
July 1, 2016
No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats premium
I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
February 16, 2016
The Past, Present and Future of Network Access Control (NAC) premium
Network Access Control (NAC), ensures proper configuration and security posture on devices trying to access a network.  It’s been around for a while, but acquired a bad reputation in its early days.  I remember looking at some NAC solutions when they first hit the market, years ago, and they were expensive, clumsy, and more likely […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
November 17, 2015
Cybersecurity 101: Privileged Account Management premium
Privileged Account Management (PAM), in both on-premise and cloud environments, is a high priority for any organization committed to security.  SANS lists it as one of their critical security controls, NIST has several control requirements associated with privileged account management, and the Cloud Security Alliance designates an entire domain to account management. To start, what […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
November 5, 2015
The Cyber Talent Drought premium
Black hat hackers make more money than white hat hackers.  A lot more.  The 2015 Symantec Internet Security Threat report states that a hacker can sell a credit card number for about $50 on the black market.  If you can steal 100,000 numbers in a few months, you stand to earn about $5 million.  This […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
November 2, 2015
The Dark Web: Dark, But Not Invisible premium
The Dark Web:  the name conjures up visions of nefarious characters doing despicable things under the cover of specialized technology that keeps them a step ahead of the law, who are hopelessly outnumbered.  Many people believe the Dark Web is like dark matter:  mysterious, undetectable, and vaster by far than our customary world. Like many […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
October 23, 2015
Cybersecurity 101: Asset Management [Video] premium
The first order of business in cybersecurity, indeed in IT management in general, is to have a reliable system inventory:  physical systems, virtual machines, software and associated configurations and vulnerabilities, and – most importantly – data.  Asset inventory is not just common sense, though, it’s the law.  The NIST 800-53 security controls require accurate tabulation […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
October 22, 2015
Cybersecurity 101: Patch Management [Video] premium
As straightforward and commonplace as patch management might be, it is still a big security hole for many organizations.  The 2015 Verizon threat report states, “…99.9% of the exploited vulnerabilities had been compromised more than a year after the associated CVE was published”.  In other words, completely preventable exploits were successful simply because basic patch […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT
June 3, 2015
How The IRS Data Breach Occurred premium
The IRS breach was exceedingly low-tech: it’s at the other end of the spectrum from the infamous and sophisticated Chinese hacking operations. This was just a bunch of bad actors who stole – or bought on the black market – personally identifiable information (PII) on a large number of American taxpayers. They accessed the IRS […]
premium
Don Maclean
Chief Cybersecurity Technologist, DLT