• Blog
en English
ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Meet Our Team
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
    • Apply for Employment
  • Contact Us
SD Solutions, LLC
SD Solutions, LLC
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Meet Our Team
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
    • Apply for Employment
  • Contact Us
Call us
Call us 540-860-0920
  1. Home /
  2. Collaboration
Ransomware Trends from Late 2020 to Early 2021
Collaboration, Cybersecurity  |   February 19, 2021

Ransomware Trends from Late 2020 to Early 2021

Controversy surrounded CD Projekt Red, a Polish videogame company, when their release of Cyberpunk 2077 was met with negative reception due to excessive glitches in console versions of the game.
Read more
backupcyber extortionFBIFloridahackphishingRaaSransomwareremote workteleworkteleworkingvulnerability
Passwords vs Passphrases
Collaboration, Cybersecurity  |   January 27, 2021

Passwords vs Passphrases

It is practically impossible to use the internet for work without creating at least one password. Unfortunately, people tend to choose passwords that are simple enough for bad actors to
Read more
brute-force attackcybersecurityentropyFBIinformation technologyinformation theorymungemungingNISTpassphrasepasswordpassword-guessing attack
COVID-19 Scams and 2021
Collaboration, Cybersecurity  |   January 5, 2021

COVID-19 Scams and 2021

Since last year, we have published several articles about COVID-19 and how cybercriminals exploit the pandemic. We expect that cybercriminals will continue to exploit the pandemic in 2021. They will
Read more
coronavirusCOVID-19cybersecurityFBIFinCENIRSmalwarephishingspearphishingspoofing
SUNBURST and Supply Chain Attacks
Collaboration, Cybersecurity  |   December 23, 2020

SUNBURST and Supply Chain Attacks

Recently, a global intrusion campaign has been making headlines. The campaign exploits SolarWinds Orion software, and roughly 18,000 of SolarWinds’ customers have been compromised. This article provides an overview of
Read more
backdoorCISAcybersecurityFireEyemalwareNISTSolarWindsSUNBURSTsupply chain attacktrojan
Insider Threats and the Principle of Least Privilege
Collaboration, Cybersecurity  |   December 16, 2020

Insider Threats and the Principle of Least Privilege

The majority of cybercriminals operate outside of the organizations they target, but some threats come from within the organizations themselves. The Department of Homeland Security defines an insider threat as
Read more
CISAcybersecurityinsider threatoperating systemprinciple of least privilegeSIEMsocial engineering
Side-Channel Attacks and Hardware Vulnerabilities
Collaboration, Cybersecurity  |   December 3, 2020

Side-Channel Attacks and Hardware Vulnerabilities

Last month, a new attack method that can work against Intel CPUs was publicized: PLATYPUS. This new attack method—discovered by Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon,
Read more
CPUcybersecuritykeyloggersmalwareMeltdownPLATYPUSside-channelside-channel attackSpectrevulnerability
Homomorphic Encryption and Privacy
Collaboration, Cybersecurity, Technology  |   November 13, 2020

Homomorphic Encryption and Privacy

Encryption is used to protect everything sensitive, including website accounts, emails, video conferencing, health records, and all sorts of data transmitted over the internet. We touched on some of the
Read more
cryptographyencryptionhomomorphicIBMprivacy
SD Solutions wins Corporate Social Responsibility Award from the Asian American Chamber of Commerce
Collaboration, News  |   November 3, 2020

SD Solutions wins Corporate Social Responsibility Award from the Asian American Chamber of Commerce

During the ‘Jewels of Asia’ Chamber Awards Gala, SD Solutions officially accepted the Corporate Social Responsibility Award from the Asian American Chamber of Commerce. The CEO of SD Solutions, Balaji
Read more
awardcorporate social responsibilitycsr
Black Hats, Gray Hats, White Hats, and More
Collaboration, Cybersecurity  |   October 30, 2020

Black Hats, Gray Hats, White Hats, and More

A previous blog article posted in August explained how a group of young hackers compromised over a hundred Twitter accounts. However, not all young hackers exploit systems for criminal purposes.
Read more
black hatblue hatcybersecuritygray hatgreen hathackerhacktivistred hatscript kiddywhite hat
National Cybersecurity Awareness Month and the Internet of Things
Collaboration, Cybersecurity  |   October 16, 2020

National Cybersecurity Awareness Month and the Internet of Things

This month, National Cyber Security Awareness Month (NCSAM) is observed for its 17th year in a row. To celebrate NCSAM, the Cybersecurity & Infrastructure Security Agency (CISA), the National Institute
Read more
CISAFBIIoTNCSAMnetwork segmentationNISTShadow IoTVLAN
1234
  • Phone Number: 540-860-0920
  • Email: bizdev@sdsolutionsllc.com
  • Address:
    • Corporate Office: 8000 Tower Crescent Drive, Tysons VA 22182
    • Principal Office: 58 W. Main St., STE B Luray, VA 22835
Copyright © 2020 - SD Solutions, LLC.