-
By July 16th, 2015Category:Read More »
The steps used to spark innovation and create efficiencies in traditional engineering could unleash a torrent of consequences if applied to cyber security. So how can you be innovative in a discipline built on checklists and compliance?
-
By June 22nd, 2015Category:Read More »
What will $216.42 buy you? A lot of cyber security feuding. Recently released reports by the Ponemon Institute, sponsored by IBM and Verizon, have two top cyber vendors at odds over the cost of a data breach. One says $217, the other starts at 58 cents. So who's right and why is it more than just a public relations feud?
-
By May 26th, 2015Category:Read More »
Your enterprise likely has two conflicting problems keeping it from an effective cyber defense. 1) You know too much. 2) You know too little. In a Q&A, Cyber Security Principal Robert J. Michalsky, who recently released a white paper on cyber security metrics, discusses how metrics turn cyber data into cyber intelligence.
-
By April 27th, 2015Category:Read More »
Let's start this post on a happy note: You have been promoted. You are now in charge of cyber security for your entire organization. Congratulations. The birds are singing. It's a nice spring day outside. The executive washroom -- if there are still such things -- is now available to you. Most importantly, there are no issues that you know of in your enterprise IT network.
-
By March 16th, 2015Category:Read More »
Seemingly everything we do online has an account. Work. Financials. Fantasy sports. Recipes. Online accounts are a hallmark of modern digital life. So why are they mostly protected by technology that's been around since Ali Baba socially engineered his way into a mountain cave?
-
By February 13th, 2015Category:Read More »
This February 14, we' hope to help you fall for good cyber security best practices, in the language of Valentine's Day: candy conversation hearts.
-
By January 26th, 2015Category:Read More »In a connected world, everything you do online carries some degree of risk. Whether it's visiting websites, conducting financial transactions or simply checking to see if the 76ers won a game (Pro tip: Whatever day you're reading this, the answer is they lost), every action has some level of risk to it.
- By December 1st, 2014Category:Read More »
There's only one "If" in cyber security: If your organization has data of value, it will be breached. (And here's a quick hint, your organization has data of value.)
This simple, if seemingly gloomy, statement has become generally accepted in cyber security circles. Eventually, the thinking goes, a determined adversary will be able to breach most network defenses. That does not mean, however, all is lost. Intrusion does not necessarily lead to a data breach.
-
By October 17th, 2014Category:Read More »
Software has a supply chain. Just like your servers, laptops, routers and other hardware, software is assembled. Each line of code came from somewhere, was tested by someone and was packaged together before you brought it into your organization.
If you’re not thinking about your software in terms of supply chain, you’re not alone.
Of course, your enterprise is also probably vulnerable as a result.
-
July 13th, 2014Category:Read More »
Editor's Note: This is the third of a three-part series on industry cyber security reports, covering research reports. Click here for Part I, covering four data summaries and click here for Part II, covering three more.
Pages
