Warning: A non-numeric value encountered in /home/makoas2/public_html/cyberlessonslearned.com/wp-content/themes/Divi/functions.php on line 5852

Defense-in-Depth, Part 3

In the first blog post in this series, defense-in-depth was defined as a military defensive strategy that focused on physical security: “Defense-in-depth is a defensive strategy designed to protect by using multiple layers of mutually supporting or reinforcing...

Received OPM Breach Notification Letter

OPM Notification and Response Today I received a breach notification letter from the US Office of Personnel Management.  My wife received one, too.  We are affected because we have both been subject to numerous “single-scope background investigations”...

Defense-in-Depth, Part 2

What is Defense-in-Depth? In the previous post, defense-in-depth was defined as: “… a defensive strategy designed to protect by using multiple layers of mutually supporting or reinforcing defenses where each layer must be penetrated and overcome before an attack can...

Defense-in-Depth, Part 1

In the first part of this multi-part blog post, Defense-in-Depth is defined and discussed from an historical perspective.  In follow-on posts, the application of Defense-in-Depth in a cyber security role will be discussed. What is Defense-in-Depth? Defense-in-depth is...

U.S. Office of Personnel Management Breach

Initial Report of Breach On April 4, 2015, the US Office of Personnel Management (OPM) discovered that the personnel data of 4.2 million current and former Federal government employees had been stolen. Information such as full name, birth date, home address and Social...
error

Enjoy this blog? Please spread the word :)