Book review: Stiennon On Security: Collected Essays Volume 1

Book review: Stiennon On Security: Collected Essays Volume 1

Posted on Jul 17, 2020by Ben Rothke As I wrote about Security Yearbook 2020: A History and Directory of the IT Security Industry, by Richard Stiennon, it was like a walk down information security memory lane. Security Yearbook 2020 details security firms we all know and sometimes love, such as Symantec, Check Point, ... Read More
The Twitter Hack Is a Security System Failing, NOT an Awareness Failing

The Twitter Hack Is a Security System Failing, NOT an Awareness Failing

Posted on Jul 17, 2020by Ira Winkler The Twitter hack, where some unknown party was able to gain access to notable Twitter accounts and sound out messages from those accounts soliciting bitcoins, made national headlines. It was an attack that became readily obvious to the world, and Twitter did seem ... Read More
Securing Devices for a Challenge of a Lifetime

Securing Devices for a Challenge of a Lifetime

Posted on Jul 16, 2020by Steve Hanna In light of the current global situation, technology is replacing a number of real-life activities to help us through the unprecedented measures that have been put in place in response to the global COVID-19 pandemic. As those transform their kitchens, bedrooms and spare ... Read More
Weekly News Roundup July 6-10, 2020

Weekly News Roundup July 6-10, 2020

Posted on Jul 10, 2020by Kacy Zurkus CompTIA announced a cybersecurity competition for high school and college students as part of the National Cyber League in an effort to promote careers in cybersecurity, according to Tech Republic. Letting young people know about a cybersecurity pathway seems to be trending this ... Read More
Why Data Protection in APAC Has Fallen between the Gaps

Why Data Protection in APAC Has Fallen between the Gaps

Posted on Jul 7, 2020by Aaron Tan Asia-Pacific organizations continue to grapple with data protection challenges, even for those that see the value of having sound data protection practices. For a start, many still see data protection from a compliance perspective, treating it as a laundry list of requirements that ... Read More
Ben’s Book of the Month: Review of “Data Breaches: Crisis and Opportunity”

Ben’s Book of the Month: Review of “Data Breaches: Crisis and Opportunity”

Posted on Jun 30, 2020by Ben Rothke When hearing the term opportunity when dealing with data breaches, many people would think that it is only lawyers who benefit in such a situation. But in Data Breaches: Crisis and Opportunity (Addison-Wesley 978-0134506784), author Sherri Davidoff writes that as devastating as a massive data breach can ... Read More
Countdown to RSAC 2020 APJ: Q&A with Jason Lau

Countdown to RSAC 2020 APJ: Q&A with Jason Lau

Posted on Jun 29, 2020by RSAC Editorial Team and Jason Lau As we’re just weeks away from RSAC 2020 APJ, we’re excited to share this year’s RSAC Ambassador Q&As with you! We’ve interviewed a fabulous cross section of attendees to give previews of their sessions, share their perspectives on how ... Read More
Weekly News Roundup June 22-26, 2020

Weekly News Roundup June 22-26, 2020

Posted on Jun 26, 2020by Kacy Zurkus We are just over two weeks away from our RSA Conference APJ 2020 virtual event, and we are super excited about the incredible experience we have to offer our community. Each day will open with a keynote address followed by educational content running ... Read More
Seven Deadly Sins of Security Communications

Seven Deadly Sins of Security Communications

Posted on Jun 25, 2020by Melissa Plicque So here you are, Security Professional, once again trying to convince a group of wayward engineers or webmasters that they need to take action to protect against a newly discovered security vulnerability. Maybe you need them to change a configuration setting, register a ... Read More
SOAR Is DevSecOps

SOAR Is DevSecOps

Posted on Jun 24, 2020by Rick Howard In 2016, I was convinced that DevSecOps was the way forward for the network defenders of the world to secure its infrastructure and its applications. Two books convinced me that it was so: Gene Kim’s famous novel, The Phoenix Project, and Google’s Site ... Read More

Secure Guardrails