Debunking Cybersecurity Myths: Part IV — No Target Too Small
You hear a lot about the biggest attacks because they make the biggest splash. But in reality, businesses of all sizes are constantly threatened and, yes, breached.
Debunking Cybersecurity Myths: Part II—Sorry, the Cloud Won’t Save Us
We now move from age-old to brand-new in this episode and address the growing misconception around an increasing shift to cloud services.
Burnt by a SIEM: A Familiar Plight in Cybersecurity
Many good teams—probably most of them—struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value.
Vendor Risk Management: Minimizing the Burden, Ramping Your Business
It’s not just regulators; suppliers must also comply with security policies of corporate partners.
Incoming Cyber Risk: How Your Contractors Can Undermine Your Security
When you think about it, it’s not surprising that contractors pose one of the biggest risks to your organization’s security.
What The Three Little Pigs Can Teach Us About Cybersecurity
What The Three Little Pigs Can Teach Us About Cybersecurity Last night, as I was putting my kids to bed*, I read them the classic children’s story, “The Three Little Pigs”. And you know what it...
Protect Your Systems From KRACK
Protect Your Systems from KRACK Yesterday’s disclosed WiFi exploit, known as “KRACK” to security researchers, targets password-protect WiFi networks that use the WPA2 standard—which is to say, it...
Send in the Blade Runner: Human Cybersecurity in the Age of Machines
Send In the Blade Runner: Human Cybersecurity in the Age of Machines I need ya, Deck. This is a bad one, the worst yet. I need the old blade runner, I need your magic. – Harry Bryant to Rick...
Blade Runner Is Coming. Is Your Network Ready for Replicants?
Blade Runner is Coming. Is Your Network Ready for Replicants? With the upcoming release of Blade Runner 2049, it’s a good time to reflect back on the first film and its grim vision of the future....