Services PIP America protects the value in your organization by managing operational risk in the cyber era
About Us Our unique partnership of top-tier consultants and U.S. military leaders aims to secure and grow American critical infrastructure, private enterprise and government Find out more about our team
Leadership Team Our people are world-class. Drawn from the highest levels of the U.S military and top-tier industry firms, they have deep industry and implementation experience Meet our Leadership Team
HighlightedPIPers Our people are world-class. Drawn from the highest levels of the U.S military and top-tier industry firms, they have deep industry and implementation experience Meet our Team
Contact Us Thank you for your interest. Get in touch with your questions or feedback Contact us to find out how we can help you
by Dawn Dunkerley Contributing Editor We Asked Def Con Attendees Why People Are Still Getting HackedThis year’s Def Con—the world’s biggest hacking conference—was more sprawling than ever. Held annually in Las Vegas, the conference has grown over the last 27 years from a small gathering of hackers huddled into the Alexis Park hotel to a nearly 30,000-person swarm spread across multiple hotels on the Strip. Editor’s note: Interesting insight from leading security experts; overwhelmingly they point to human failures as the root cause of vulnerability. READ MORE Breached Passwords Still in Use By Hundreds of ThousandsMore than 300,000 users still utilize credentials that have been compromised – with people visiting video streaming and porn sites most at fault, Google found in a new study. Hundreds of thousands of web visitors continue utilizing passwords that have previously been compromised. Editor’s note: Password reuse – at home or at work – leads to compromise. One account is breached, and if the password has been reused elsewhere, the hacker simply tries different sites until one works. A classic case of cyber hygiene that matters. READ MORE US Chamber of Commerce, FICO Report National Risk Score of 688While the score was up for large businesses and down for small firms, the report urges all to prioritize third-party risk management. Editor’s note: An excellent point that, no matter your own cyber security practices, if you don’t hold your third-parties accountable for their systems and processes, you introduce vulnerability into the mix. Many of these third-parties have limited resources to prioritize cyber security. READ MORE What Americans Think About RansomwareNew Harris Poll survey says most will weigh candidates’ cybersecurity positions. Editor’s note: It seems like we hear of a new ransomware event daily, with US cities increasingly in the news as victims. With elections on the horizon, and these governments often controlling the security of the voting equipment, it’s past time to clean our acts up. READ MORE Cyberthreats Against Financial Services Up 56%Financial institutions interacting with customers online must prepare fora broader, more sophisticated variety of threats. Editor’s note: The study found that brand abuse and manipulation was the most common threat; a loss of reputation or trust is difficult to quantify, but once gone, nearly impossible to regain. READ MORE Leave a Reply Cancel reply Your email address will not be published. Required fields are marked *Comment Name * Email * Website