5 Ways to Reduce Cybersecurity Risk and Win Over Your CEO and CTO

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyberincident or data breach occurred or security questions arose, these got deferred to IT for the answers. But with today’s massive data breaches and very costly cyberattacks, the responsibility of cybersecurity has..
Read more

What Your Favorite TV Shows Get Right (and Hilariously Wrong) About Air Gap Technology

Chances are, one of the first places you may have heard about an air gap computer was on TV. Olivia Pope on “Scandal” knows what air gap technology is. Elliot on “Mr. Robot” knows how to circumvent an air gap to gain access to highly secure information. Even Aaron Sorkin’s “The Newsroom” characters know that..
Read more

Exposing the Culture of Compliance Cramming

Thursday, Feb. 1, marked the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing cyberattacks and promoting a better response to cyberattacks that result in payment data breaches. It was announced in 2016, giving organizations almost two years to prepare for these increased requirements for compliance. Unfortunately, however, a..
Read more

Security Analytics: Using Game Design to Improve Visualization and Insights

Although gamification has been widely adopted within enterprises for recruiting, project management and customer engagement, the trend has yet to be widely accepted in cybersecurity. However, many concepts used in game design have the potential to significantly improve today’s security analytics standards and outcomes. My colleague, Sagar Mohite, is on the front lines of using..
Read more

Hardware Security Is Best for Securing Healthcare, Finance IoT

Over the past year, we’ve seen a wave of high-profile cyberattacks, and all companies should be concerned. These attacks haven’t been limited to any one industry, but range from credit scores (Equifax) to health care (WannaCry ransomware attack). WannaCry, in particular, points to a growing threat: cyberattacks on infrastructure. As CNN explained, “The ransomware, called..
Read more

Prioritizing Your Safety and Cyber Hygiene: Where Do You Even Begin?

Digital transformation and the evolving threat landscape are having a significant impact on IT teams. Network professionals who were once masters of their IT domains are now being stretched to the breaking point with the adoption of multicloud infrastructures and services, the burgeoning addition of IoT networks and devices, BYOD, mobile workers and shadow IT...
Read more

Data Privacy Day: Where Has Privacy Gone, and Will We Ever Get it Back?

The end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nations and cultures, but one commonality is that privacy is becoming less of an option for most citizens. In the coming years, we will see major head-to-head debates between governments and citizens. Governments don’t like..
Read more

Bad Rabbit is No Match for Secure Remote Browsing

Last year’s barrage of ransomware attacks, from WannaCry and Petya (NotPetya) to Bad Rabbit, had enterprises constantly reacting to the latest internet-borne cyberthreats. Reliance on the web, combined with social engineering, paves the way for destructive possibilities that can compromise even the strongest organization’s cybersecurity frameworks. Unfortunately, in many instances, the human factor is the weak link responsible..
Read more

Blockchain: Hype or Hope for Transactional Security?

It has been said that time is nature’s way of making sure everything doesn’t happen at once. In practice, time is a good way to make sure that events happen in order: that payment happens before title is conveyed or that authentication happens before privileges are granted. It has also been said (long before computers)..
Read more
Page 1 of 3123