SecuringAV: The Colonial Pipeline Ransomware Cyberattack — Part 2

August 6, 2021

What motivates a hacker or group of cyberattackers? The answer is typically money. For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. The Colonial Pipeline ransomware attack in May of 2021 caused […]

featured Image

SecuringAV: The Colonial Pipeline Ransomware Cyberattack — Part 1

July 27, 2021

Why did the pipeline get shut down if the hackers only attacked the business end?  For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. By now, most people heard about the Colonial […]

featured Image

SecuringAV: The Remote Desktop Attack on a Florida Water Treatment Plant

June 24, 2021

For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. In my last “SecuringAV” column about the Nashville Christmas morning bombing, I did my best to define what “infrastructure project” meant using the […]

featured Image

Lessons From the SolarWinds Hack

February 16, 2021

In mid-December, news broke about a massive cyber breach that occurred through SolarWinds software. There is a chance (I hope not) that many in the AV community briefly looked at this, decided it was an IT issue and moved on. If you did, I think that was a mistake — and want to tell you […]

featured Image

Securing AV: The SolarWinds Attack of 2020 (Actually 2019)

February 15, 2021

For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure, and cyber-physical security. While most Americans are still processing the recent attack on the United States Capitol building, many cybersecurity researchers and professionals believe the real […]

featured Image

The Art of Hacking AV Systems

August 13, 2018

There are quite a few conferences that focus on AV equipment. On the consumer side, there is CES, on the broadcast side there is NAB, then for residential AV there is CEDIA Expo and for commercial AV, we have InfoComm. The latest conference to focus on AV equipment, however, happened Friday, August 10th. The conference? DEFCON. […]

featured Image

All Data Is Consequential

February 3, 2018

As the world moves further and further into a technology-enabled and -dependent world, serious questions arise about personal and institutional privacy. Recently, news headlines have revealed that a seemingly innocuous bit of data could have far reaching and deadly side effects. Over the past several years, the U.S. Army has issued fitness trackers to its […]

featured Image

Toss Aside Conventional Wisdom and Stay Relevant

March 6, 2015

For an industry that leads in so many ways, the Audio/Video/Lighting manufacturers still have a lot to learn when it comes to reaching targeted prospects and clients. The dissonance from engineering to marketing is jarring. I have identified “Three Mistakes AVL Manufacturers Are Making” in this month’s Trends article, hoping to help re-frame the conversations […]

featured Image

If You Build It, They Will Hack It

February 23, 2015

There’s a great quote from an article by John Chambers, CEO of Cisco Systems, about hacking into systems: “There are two types of companies: Those who have been hacked, and those who don’t yet know they have been hacked.” While Mr. Chambers point is about securing data, networks, and storage, the quote prompted a different […]

featured Image

Sony-pocalypse Round 2 – Sony Pictures Fights Back (Updated)

December 17, 2014

Since I put out the blog Sony-pocalypse Round 2 — Sony Pictures Fights Back… the other day, new major developments have taken place since it published. Thus a necessary edit to the blog. We’ll start from the top: If you haven’t already heard, Sony Pictures was recently breached, and it was brutal. If you need […]

featured Image

Google and the Security Princess

October 31, 2014

Meet Google’s Security Princess. From an article published in Elle Magazine in August of this year, the header gives a unique description of her: As Google’s top hacker, Parisa Tabriz thinks like a criminal—and manages the brilliant, wonky guys on her team with the courage and calm of a hostage negotiator. Whoa. Weeks back I […]

featured Image