- By July 16th, 2015Read More »
The steps used to spark innovation and create efficiencies in traditional engineering could unleash a torrent of consequences if applied to cyber security. So how can you be innovative in a discipline built on checklists and compliance?
- By December 1st, 2014Read More »
There's only one "If" in cyber security: If your organization has data of value, it will be breached. (And here's a quick hint, your organization has data of value.)
This simple, if seemingly gloomy, statement has become generally accepted in cyber security circles. Eventually, the thinking goes, a determined adversary will be able to breach most network defenses. That does not mean, however, all is lost. Intrusion does not necessarily lead to a data breach.