Security Beyond The Perimeter

Security Beyond The Perimeter

Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls ... Read More
The Hay CFP Management Method – Part 2

The Hay CFP Management Method – Part 2

/ / articles
I’ve had a lot of positive feedback from my first post which explained how to create the Trello board to track your Call For Paper (CFP) due dates, submissions, and results. In this post, I’ll explain how to create the cards and populate them with the required data to better ... Read More
The Hay CFP Management Method

The Hay CFP Management Method

/ / SBN News, Security Research
People often ask me how I manage the vast number of abstracts and security call for papers (CFPs) submissions. So I thought I’d create a blog post to explain my process. For lack … Continue reading The Hay CFP Management Method → The post The Hay CFP Management Method appeared ... Read More
Detect and Prevent Data Exfiltration Webinar with Infoblox

Detect and Prevent Data Exfiltration Webinar with Infoblox

/ / News, SBN News, Webinar
Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview Data ... Read More
Petya Ransomware: What You Need to Know and Do

Petya Ransomware: What You Need to Know and Do

Unless you've been away from the Internet earlier this week, you've no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday ... Read More
Diving into the Issues: Observations from SOURCE and AtlSecCon

Diving into the Issues: Observations from SOURCE and AtlSecCon

Last week I had the pleasure of presenting three times, at two conferences, in two different countries: SOURCE in Boston, MA and at the Atlantic Security Conference (AtlSecCon) in Halifax, NS, Canada. The first event of my week was SOURCE Boston. This year marked the tenth anniversary of SOURCE Conference ... Read More
🙂

Transitioning from my CISO role at DataGravity

/ / News, SBN News
As of today I'm transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get ... Read More
Weekend reading: Friday, March 17, 2017

Weekend reading: Friday, March 17, 2017

We’re back with this week’s edition of “Weekend Reading.” Below are some of the data stories from this week that you just can’t miss. I know that I found each of them beneficial (and equally … The post Weekend reading: Friday, March 17, 2017 appeared first on DataGravity Blog ... Read More
We have your data: how to fight ransomware

We have your data: how to fight ransomware

Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity ... Read More
2016 broke security records, but 2017 is on track to be worse

2016 broke security records, but 2017 is on track to be worse

It’s no secret that 2016 was a tough year for security and IT pros. From reported security issues behind the U.S. election to the Beautiful People hack, the year was plagued by countless breaches that … The post 2016 broke security records, but 2017 is on track to be worse ... Read More
Loading...