Ben-matrix.png

The Quest for Optimal Security

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...
Information Security Professionals

Key Traits Employers Seek from Information Security Professionals

The onslaught of technological advancements means businesses around the globe—be it governments, financial institutions, manufacturing units or technology firms—are seeking  proactive and sturdy security practices in the digital landscape. Data is everywhere ...
Security Boulevard
Cybersecurity Career Path – A Fresh Perspective

Cybersecurity Career Path – A Fresh Perspective

My expertise is not necessarily laden in the land of career counseling, hiring standards, and education recommendations. However, anecdotally, coming into a cybersecurity career in an unorthodox manner and blossoming through passion ...
Platypuses and Policies: Akamai's Approach to the GDPR and Information Security

Platypuses and Policies: Akamai’s Approach to the GDPR and Information Security

Written by Meyer Potashman On May 25, 2018, the EU General Data Protection Regulation (GDPR) went into effect. In preparation, Akamai, like every other company that does business with or interacts in ...
The Value of Capture the Flag Competitions

The Value of Capture the Flag Competitions

If you’ve ever attended an infosec or hacker conference, you’re sure to have seen the Capture the Flag or CTF. As with anything in this industry, there are ebbs and flows in ...
Moonshot Information Security Project

The Moonshot Information Security Project

Recently, I was reading about the U.S. government considering funding a “moonshot” information security project—that is, like the efforts in the 1960s to reach the moon (before the Soviets), abandon incrementalism in ...
Security Boulevard

Infosecurity Europe 2018: Being the First to Respond in the Digital World

The world is full of first responders. You may not realize it, but you will know someone who is a first responder. Typically, one would associate a first responder with the three ...
Forget C-I-A, Availability Is King

Forget C-I-A, Availability Is King

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...

Dispelling the Myth: How to Optimize Your Company for Both Cyber Security and Productivity

If there is one thing that executives and managers never want to disrupt it would be productivity. As most managers know, productivity is the ability to make use of resources while producing ...

GDPR Is Coming, So What Now for WHOIS Domain Registration Data?

When the European Union General Data Protection Regulation (GDPR) comes into force on May 25, 2018, what will happen to currently-available domain registration data in WHOIS? The GDPR restricts how personal data ...
Loading...