Pentagon’s lack of cyber authority leaves data at risk…

Lawmakers on the Senate Armed Forces Committee claim that the Department of Defense is not taking strong enough action against defense contractors in regards to protecting Controlled Unclassified Information (CUI), which is putting all of that data at risk. Given [...]

2022-11-28T23:18:39-08:00August 30th, 2018|

Six of the Most Dreaded IT Projects

Written by Dan Tynan (Writer, Editor, and Consultant). Originally posted on CIO.com on June 25, 2018. Alvaka Networks CEO, Oli Thordarson, and CTO, Unnar Gardarsson, contribute to this discussion on what projects IT professionals dread the most. The projects that most IT [...]

2024-03-14T00:11:19-07:00June 28th, 2018|

The Questions to Ask When Hiring an IT Security Consultant

by Jessica Thiefels, VP of Community Management for PolySwarm. Learn what questions to ask when hiring an IT security consultant, including insight from Alvaka Networks CEO, Oli Thordarson. If you can’t afford an in-house IT security team, you have to look [...]

2018-06-29T15:22:40-07:00May 24th, 2018|

Private sector’s national cybersecurity strategy contributions lacking

By Kevin McDonald The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity laws. Private companies should be responsible for [...]

2020-05-27T16:41:09-07:00January 31st, 2018|

How information technology advisory groups can benefit organizations

By Kevin McDonald In today's cyber environment, many public safety organizations struggle to advance their technology and maintain security. Many departments would love to seek out efficiencies through advanced, cost-saving technology. They know they must improve their cybersecurity and operating efficiency. [...]

2020-05-27T17:04:15-07:00December 18th, 2017|

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile Security In its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as [...]

2020-04-08T23:06:51-07:00March 8th, 2017|