- By July 16th, 2015Read More »
The steps used to spark innovation and create efficiencies in traditional engineering could unleash a torrent of consequences if applied to cyber security. So how can you be innovative in a discipline built on checklists and compliance?
- By June 22nd, 2015Read More »
What will $216.42 buy you? A lot of cyber security feuding. Recently released reports by the Ponemon Institute, sponsored by IBM and Verizon, have two top cyber vendors at odds over the cost of a data breach. One says $217, the other starts at 58 cents. So who's right and why is it more than just a public relations feud?
- By May 26th, 2015Read More »
Your enterprise likely has two conflicting problems keeping it from an effective cyber defense. 1) You know too much. 2) You know too little. In a Q&A, Cyber Security Principal Robert J. Michalsky, who recently released a white paper on cyber security metrics, discusses how metrics turn cyber data into cyber intelligence.
- By April 27th, 2015Read More »
Let's start this post on a happy note: You have been promoted. You are now in charge of cyber security for your entire organization. Congratulations. The birds are singing. It's a nice spring day outside. The executive washroom -- if there are still such things -- is now available to you. Most importantly, there are no issues that you know of in your enterprise IT network.
- By March 16th, 2015Read More »
Seemingly everything we do online has an account. Work. Financials. Fantasy sports. Recipes. Online accounts are a hallmark of modern digital life. So why are they mostly protected by technology that's been around since Ali Baba socially engineered his way into a mountain cave?
- By January 26th, 2015Read More »In a connected world, everything you do online carries some degree of risk. Whether it's visiting websites, conducting financial transactions or simply checking to see if the 76ers won a game (Pro tip: Whatever day you're reading this, the answer is they lost), every action has some level of risk to it.
- By December 1st, 2014Read More »
There's only one "If" in cyber security: If your organization has data of value, it will be breached. (And here's a quick hint, your organization has data of value.)
This simple, if seemingly gloomy, statement has become generally accepted in cyber security circles. Eventually, the thinking goes, a determined adversary will be able to breach most network defenses. That does not mean, however, all is lost. Intrusion does not necessarily lead to a data breach.
- By October 17th, 2014Read More »
Software has a supply chain. Just like your servers, laptops, routers and other hardware, software is assembled. Each line of code came from somewhere, was tested by someone and was packaged together before you brought it into your organization.
If you’re not thinking about your software in terms of supply chain, you’re not alone.
Of course, your enterprise is also probably vulnerable as a result.
- July 13th, 2014Read More »