Marin Jazz presents Kim Nalley – A Joyful Billie Holiday

  • GOP who stopped Obama from releasing Russian cyber attacks. How they will respond to the Trump and Putin alliance will determine the future or demise of the free world.

    World Peace in the hands of Tillerson?
    World Peace in the hands of Tillerson?

    “The sanctions are targeted, not sectoral, and will have a very limited impact,” said Thomas Wright, a fellow and director of the Project on International Order and Strategy at the Brookings Institute. “This will not deter Putin from interfering in French or German elections in 2017.”

    Thomas Wright also suggests that:  “Trump is opposed to America’s alliance arrangements, he is opposed to the open global economy, and he is pro-authoritarian and pro-Russian.  That it is pretty clear this is the most important election anywhere in the world since the two German elections of 1932,” he wrote, in reference to the parliamentary elections that ultimately resulted in Adolf Hitler coming to power. “No other election has had the capacity to completely overturn the international order—the global economy, geopolitics, etc.”

    In the Atlantic Monthly article Thomas Wright further explains: “Trump’s isolationist ideology has three components, according to Wright: 1) opposition to U.S. alliances; 2) opposition to free trade; and 3) support for authoritarianism. In Wright’s view, these three beliefs, if translated into policy in a Trump administration, could do away with the liberal international order that the United States helped design after World War II and has led ever since.  Full Article

    Thomas Wright explains in a report for the Lowy Institute for International Policy:  “To understand Donald Trump’s foreign policy, we must distinguish between his three core beliefs that he has held for many decades and rarely if ever wavered from, the central themes of his campaign, and other issues. His core beliefs are opposition to America’s alliance arrangements, opposition to free trade, and support for authoritarianism, particularly in Russia. If he is elected president and governs in a manner consistent with these beliefs, the United States will be transformed from the leader of a liberal international order into a rogue superpower that withdraws from its international commitments, undermines the open global economy, and partners with Putin’s Russia.” Full Report

    How the GOP responds to the Trump and Putin alliance forged to transform the US into a rogue country that works solely for a few chosen corporation – just like Russia is now – will determine our future and the future of the free world.

    Source: Thomas Wright quotes from a variety of sources. For more information feel free to contact him directly at The Brookings Institute

  • Cyber Warfare attacks by Russians are happening all over the US

    Down the Rabbit Hole we go.
    Down the Rabbit Hole we go.
    The US Government released a report and recommends that all citizens and companies take pre-cautions.

    The Department of Homeland Security (DHS) recommends that network administrators review the IP addresses, file hashes, and Yara signature provided and add the IPs to their watchlist to determine whether malicious activity has been observed within their organizations. The review of network perimeter net flow or firewall logs will assist in determining whether your network has experienced suspicious activity. When reviewing network perimeter logs for the IP addresses, organizations may find numerous instances of these IPs attempting to connect to their systems. Upon reviewing the traffic from these IPs, some traffic may correspond to malicious activity, and some may correspond to legitimate activity. Some traffic that may appear legitimate is actually malicious, such as vulnerability scanning or browsing of legitimate public facing services (e.g., HTTP, HTTPS, FTP). Connections from these IPs may be performing vulnerability scans attempting to identify websites that are vulnerable to cross-site scripting (XSS) or Structured Query Language (SQL) injection attacks. If scanning identified vulnerable sites, attempts to exploit the vulnerabilities may be experienced.

    Commit to Cybersecurity Best Practices

    A commitment to good cybersecurity and best practices is critical to protecting networks and systems.

    Here are some questions you may want to ask your organization to help prevent and mitigate against attacks.

    1. Backups: Do we backup all critical information? Are the backups stored offline? Have we tested our ability to revert to backups during an incident?

    2. Risk Analysis: Have we conducted a cybersecurity risk analysis of the organization?

    3. Staff Training: Have we trained staff on cybersecurity best practices? 4. Vulnerability Scanning & Patching: Have we implemented regular scans of our network and systems and appropriate patching of known system vulnerabilities?

    5. Application Whitelisting: Do we allow only approved programs to run on our networks? 6. Incident Response: Do we have an incident response plan and have we practiced it?

    7. Business Continuity: Are we able to sustain business operations without access to certain systems? For how long? Have we tested this?

    8. Penetration Testing: Have we attempted to hack into our own systems to test the security of our systems and our ability to defend against attacks?

    For the full document with more valuable advice:  Click

We bring celebrities, causes, and companies together for mutual benefit.

Proudly powered by WordPress