BlackRidge Named 2020 TAG Cyber Distinguished Vendor

We are delighted that BlackRidge has been selected as a distinguished vendor in the 2020 TAG Cyber Security Annual. This is the third year that we have been selected as a distinguished vendor that also includes an interview of our CTO John Hayes.

A High Assurance Approach to Securing Network Infrastructure

Network infrastructure devices provide ideal targets for sophisticated attackers as evidenced by the infiltration of our critical infrastructure. Learn about DHS security tips for securing network devices and a high assurance approach to network security.

The Scoop on FIPS 140-2

Guest blog from SafeLogic to share some background on the Federal Information Processing Standard (FIPS) 140-2 program and why we’re so excited about BlackRIdge achieving FIPS 140-2 validation.

Digital Health’s Security Imperative

Digital health reduces many of the inefficiencies in healthcare delivery, it improves access to healthcare information and services, increases the quality of delivery, and allows much more personalized application of healthcare to patients

Defending Blockchains from Network Attacks

Transactions that have not been committed to the blockchain are vulnerable to several types of attack. This blog examines some identity and time attack vectors in blockchains.

Establishing Trust in your Healthcare Systems

As technical advancements continue to drive the healthcare industry forward, cyber security must be an integral part of every healthcare organization’s operational and customer strategy.

Defending ICS and SCADA Systems from Cyber Attacks

As the Industrial Internet of Things proliferates and converges with IT, CSOs and CIOs need to assess the risks with their growing attack surface. This blog reviews common attack types and how to block or defend against them.

Cyber Security Predictions and the Industrial IoT

Starting a new year it is always interesting to read the industry experts predictions. One such article was published by TechRepublic who asked cybersecurity experts for their predictions...

Why Cyber Defense Automation is Needed

Cyber-attacks are a daily occurrence and the attacks as a whole are unrelenting. Day after day, hour after hour, our IT systems, both enterprise and personal, are probed, scanned and attacked...

Cyber Security in the Third Wave of the Internet

The first wave was about building the Internet, the second about building services and connecting devices. The third wave is all about connecting everything and stopping the bad guys. So what does this mean for security?

Cyber Security in the Age of a Presumed Breach

Every day we are reminded how vulnerable our information systems are to cyber-attacks. Massive data breaches have become routine and recent notable cases include the legal, banking, government, industrial, media and healthcare industries.

Dynamic Network Segmentation using Identity

Network segmentation is a best practice that is increasingly impractical to implement and maintain in large corporate environments. A new approach to segmentation is to apply identity-based access controls at the network transport layer to dynamically segment networks by blocking or allowing network connections.

BlackRidge Defensive Behavior for Common Attack Scenarios

BlackRidge addresses key aspects of an attack chain, from stopping scanning and reconnaissance to preventing unauthorized access to systems. First packet authentication of network sessions enables identity attribution prior to allowing access to network resources, providing unique and timely data to SIEM and analytic systems.
John Hayes - CTO

A New Dynamic Security Model for NFV and SDN

So what is up with BlackRidge and Network Function Virtualization (NFV) and Software Defined Networking (SDN)? We recently participated in the announcement of the Ciena Agility Matrix NFV solution for service providers and their enterprise customers.

Adopt New Cyber Defense Technologies Now

Why are computer systems being attacked? Because the attackers believe that their attacks will succeed and succeed with little risk of retribution. This is the current dynamic. From a strategy perspective, it often looks like the attackers have the upper hand

Cybersecurity Paralysis as a Dunning-Kruger Problem

Legend has it that 19th century laws in the midwest stipulated that if two trains arrived simultaneously at a crossing on intersecting tracks, neither should proceed until the other had gone ahead.

What’s more exciting than validating 100GbE performance?

We announced the success of our 100G Gateway demonstration done in in an independent, third party lab, the CTE Lab at the Quality Technical Services (QTS) facility in Sandston, VA., externally monitored by QTS and i2 Sentinel Associates.

Evaluating and Measuring Network Risk

Despite best efforts to secure and maintain trust on increasingly perimeter-less networks, it is difficult to maintain across network borders, especially in cloud environments, nor can it be sufficiently established with all the various devices accessing these services. These conditions and factors all contribute to the increased complexity and expense of being able to quantify and assure an acceptable level of business risk.

What’s Yours is Mine!

While working within the security community, we have learned that the universe of security can be described by certain laws, much as the physical universe is described by certain absolute statements. One of the classic articles of computer security came from Microsoft in an era when security was not their strong suit.

Comparing BlackRidge TAC vs. Port Knocking

We are occasionally asked if BlackRidge Transport Access Control isn’t just another form of port knocking. While both TAC and port knocking provide forms of authentication before allowing network packets to proceed, the similarities end there. Continue reading to learn more.

Is Identity the New Perimeter?

A recent Dark Reading article conceptualized ‘Is Identity the new Perimeter? BlackRidge agrees with the premise of the perimeter-less enterprise, and with using strong identity to establish trust. To take the argument further, trust needs to be established end-to-end, starting with a device, and be inclusive of all of the underlying resources being accessed and used.