top of page
All Posts
Advanced Persistent Threat (APT) Attack targeting the Biomanufacturing industry - Overview and Proposed Response Actions for DIB organizations
Since January 2020, a proliferation of malware and variants has been targeting the bioeconomy. The malware is delivered by a popular ‘loader’ application called SmokeLoader, which is designed to affect both Windows machines and servers. Tardigrade is a variant of the SmokeLoader malware loader family and targets Windows platforms. It is a mechanism used to download other viruses onto infected machines, but it also has ‘virus-like’ properties that can be very damaging to an
Scott Anderson
Nov 3, 20252 min read
North Korea's Remote Worker Scam
Since the notion of artificial intelligence (AI) emerged in the 1950s, it has been a staple of pop culture. While there are countless good news scenarios of AI's potential positive impact on our world, many rational people saw it as a Pandora's Box. The sci-fi world is replete with stories of AI underpinned masses running amok and eviscerating humankind. Be it a formidable army of cyborg warriors that overwhelms us or an innocuous, uncountable cluster of smart bots that event
Scott Anderson
Nov 3, 20253 min read
Politics and Cyberspace
Any warfighter can tell you that when engaged in combat, every second matters. It is no different in cyberspace. At the speed of cyber, every nanosecond matters. Make no mistake, just as sure as we've been at war in Iraq and Afghanistan, we're also fighting daily in cyberspace. Even more challenging, this war is being waged on all fronts simultaneously. Ironically, even as man wages conventional war, we recognize the need for governance and rules to protect the people th
Scott Anderson
Oct 29, 20254 min read
What is the Right Course for the Orioles at the Trade Deadline?
To sell or not to sell – that is the question! Two weeks ago, the notion that the Baltimore Orioles could claw their way back into playoff contention was ridiculous. Sitting at 16 - 34 and having won only one series the entire season, it was clear to experts and fans alike that a 2025 reboot was required to contend in 2026. Anyone not named Henderson, Rutschman, Cowser, or Holiday would be on the trading block, partly as a salary dump and partly as a quick avenue to reload th
Scott Anderson
Oct 29, 20254 min read
Does 'Mutually Assured Destruction Apply in Cyberspace?
Whatever happened to the notion of 'mutually assured destruction'? Surely the concept is not gone forever. The mere thought of, 'we better not do it to them, because they can do the same thing to us' kept the United States and the Soviet Union from trading nuclear attacks throughout the Cold War. Why ? Because both nations recognized the other's capabilities and knew that if either launched, both would be destroyed. Strength deterring strength. So, does that same concept tra
Scott Anderson
Oct 29, 20254 min read
CISA, NSA, and FBI on China Cyber Threat
The Federal Bureau of Investigation (FBI) recently reported that “the Chinese government is seeking to become the world’s greatest superpower through predatory lending and business practices, systematic theft of intellectual property, and brazen cyber intrusions.” There is a chance this bypassed your radar, even if you keep up with cybersecurity news, as stories about state-sponsored PRC actors infiltrating critical United States information systems are common. Just last wee
Scott Anderson
Apr 29, 20253 min read
Securing the Manufacturing Sector
It is easy to make the case that manufacturing is the backbone of innovation in the United States. Because of its criticality, it is...
Scott Anderson
Apr 10, 20253 min read
Securing the Internet of Things
You’ve likely heard the term Internet of Things (IoT) – but do you know what it means? Do you understand its composition? It is a bit of...
Scott Anderson
Apr 9, 20253 min read
The Importance of Access Control for Supply Chain Companies
When it comes to Cybersecurity Maturity Model Certification (CMMC) domains, one of the most significant focuses on Access Control. CMMC...
Scott Anderson
Mar 26, 20253 min read
Closing the Cybersecurity Gap
In 2018, Bloomberg published an article covering a Chinese compromise of hardware components built by a U.S. microchip manufacturer. The...
Scott Anderson
Mar 14, 20256 min read
Identifying Social Engineering Attacks
Every employee in your company, no matter how well-intentioned, is susceptible to social engineering based cyber-attacks. Cisco reported...
Scott Anderson
Mar 11, 20253 min read
Protecting Yourself from the Menace that is the PRC!
The Federal Bureau of Investigation (FBI) recently reported [MC1] that “the Chinese government is seeking to become the world’s...
Scott Anderson
Mar 11, 20253 min read
The Brave New World of Cybersecurity Information Sharing
Nearly every Defense Industrial Base (DIB) partner knows of the National Security Agency (NSA) and its cybersecurity mission. The NSA.gov...
Scott Anderson
Mar 11, 20253 min read
Salt Typhoon and United States Telcos
One of the most compelling (and worrisome) cyber-attacks of the last quarter of 2024 was directed at major United States...
Scott Anderson
Mar 11, 20252 min read
bottom of page