The Greatest of Rewards – Working with Integrity

There are many rewards to being a world class cybersecurity solutions provider at a time when demand for effective solutions is exponentially greater than the existing supply – and getting greater by ...

The Top Tactics to Be Successful at Secure DevOps

Today’s increasingly connected world, with access to mobile devices and cloud scale computing, is leading to disruption in business models and processes. To succeed, you have no option but to continuously deliver ...
Semiconductor Foundry Notifies Customers of Computer Virus Incident

Semiconductor Foundry Notifies Customers of Computer Virus Incident

A semiconductor foundry notified its customers of a computer virus incident that at least partly disrupted its shipping schedule. On 5 August, Taiwan Semiconductor Manufacturing Company, Limited (TSMC) published an update about ...

6 Steps for Establishing and Maintaining Digital Integrity

To create a secure digital profile, organizations need digital integrity. This principle encapsulates two things. First, it upholds the integrity of files that store operating system and application binaries, configuration data, logs ...
Forget C-I-A, Availability Is King

Forget C-I-A, Availability Is King

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...

Data Integrity Follow Up: Ways to Protect Your Data

Previously, I brought attention to what I believe is one of the biggest cybersecurity challenges: data integrity. As I note in a different piece, we have entered a strange phase in our ...

Data Integrity: The Next Big Challenge

Many of us in the cybersecurity world have followed this general mantra: protect the data, protect the data, protect the data. It’s a good mantra to follow, and ultimately that is what ...

Integrity: The New “I” in PCI Compliance

The retail industry saw more than its fair share of data breaches in 2017, with security incidents detected at American supermarket chain Whole Foods Market and clothing companies Brooks Brothers, The Buckle, ...

Foundational Controls for Integrity Assurance – Part I

Among organizations today, there’s not enough focus on where digital security matters, that is, setting up the challenge/risk. Let’s come right out and say it: if you haven’t been hacked yet, you ...