Cybersecurity

A Fresh Approach to Cybersecurity, Part 4

Technology is a third rail because the implementation of technology is by far the easiest thing to mess up for any organization and no one wants to talk about it. This is the last installment of the four-part “What is Cybersecurity?” series. While no ground-breaking truths have been uncovered, we’ve presented information that is necessary for leadership and […]

A Fresh Approach to Cybersecurity, Part 4 Read More »

5 Must-Read Cybersecurity Articles, February 2016

The entire cybersecurity industry has been looking at cyberdefense in the wrong way and frankly has used the wrong technologies in the wrong place when addressing it. ~Larry Karisny While the Apple/FBI privacy case is dominating mainstream news headlines – and journalists are getting hacked writing about it – there is plenty going on in the

5 Must-Read Cybersecurity Articles, February 2016 Read More »

A Fresh Approach to Cybersecurity, Part 3

This series, What is Cybersecurity?, outlines the basic tenets of how the three areas of the cybersecurity triangle may be implemented by an organization. The cybersecurity triangle (people, process, technology) has been the focus of the series, as it provides an easy, understandable framework for discussing what comprises cybersecurity and the areas of concentration to

A Fresh Approach to Cybersecurity, Part 3 Read More »

Top Cybersecurity Articles Trending this Week

Here are the top cybersecurity articles from January 14-27, 2016. Signup to receive biweekly updates here.    Nine of Ten Breaches Easily Avoidable, Study Finds Nine of every ten data breaches that occurred in the first eight months of 2015 were “easily avoidable,” underscoring the need for private sector investment in tools and processes to

Top Cybersecurity Articles Trending this Week Read More »

A Fresh Approach to Cybersecurity, Part 2

This four-part What is Cybersecurity? series discusses the impact of cybersecurity to an organization and the three approaches which must be addressed to achieve cybersecurity nirvana. Yet cybersecurity nirvana is truly never attainable due to the always evolving nature of cybersecurity. The evolution of cybersecurity is directly attributable to one area: people. In the first part

A Fresh Approach to Cybersecurity, Part 2 Read More »

6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords such as “admin.admin,” “password,” “root,” and “administrator,” found in the open passwords lists and vendor documentation.

6 Must-Read Cybersecurity Articles, January 2016 Read More »

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions

Getting Started with Data Loss Prevention: 4 Best Practices Read More »

7 Articles Trending in Security this Week

  Security, AI, IoT, digital transformation to dominate 2016 “For all the benefits of increased agility, flexibility, productivity and convenience provided by IoT and smart devices, the system remains worryingly open to attack.” The year 2015 has been another exhilarating year in the technology industry, with advances in cloud computing, machine-to-machine (M2M) and the Internet

7 Articles Trending in Security this Week Read More »

A Fresh Approach to Cybersecurity, Part 1

This is the first installment of a four-part series on the equal nature approach to cybersecurity.  “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” ~Bruce Schneier What is Cybersecurity? The answer to “What is Cybersecurity?” changes every couple of years based on

A Fresh Approach to Cybersecurity, Part 1 Read More »

Scroll to Top