The future leaders of cybersecurity will be fluent in languages other than technology and will stop using fear to conflate the message of vulnerability versus risk. That’s the message that kicked off this year’s (ISC)2 Security Congress conference.  Donald Freese, deputy assistant director at the FBI, and Brandon Dunlap, managing director at Brightfly, talked about […]

Read More

There’s an old saying that change is the enemy of security.  To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to the management of security technologies.  Experienced cybersecurity professionals often opt to install management servers and software on their networks so that management and staff “owns” […]

Read More

Login credentials and other sensitive data from more than a half million vehicle tracking devices, which continually pinpoint vehicles’ locations, were left unprotected online. The exposed records belonging to SVR Tracking, headquartered in San Diego, were discovered by Kromtech security researchers. Thanks to a misconfigured Amazon AWS S3 bucket, 540,642 account IDs which included logins […]

Read More

DERBYCON – Ransomware is a topic everyone knows about, but unless you’ve experienced a Ransomware attack, it’s hard to really describe and understand the stress associated with these events. This year has seen Ransomware take the top spot when it comes to attention in the security world. A soon to be released study from Holger […]

Read More

Security teams collect a heck of a lot of data today.  ESG research indicates that 38% of organizations collect, process, and analyze more than 10 terabytes of data as part of security operations each month.  What types of data?  The research indicates that the biggest data sources include firewall logs, log data from other types […]

Read More

The cybersecurity market is rife with conferences that feature keynote speakers, industry experts, vendor demos, training sessions, hack-a-thons and professional networking.  Some of the best events are centered on a narrowly defined topic, an industry vertical, or a niche technology. And with CyberTechnologyXchange (CTX), we have a new venue focused on the burgeoning managed security service providers […]

Read More

Mobility is a disruptive technology. It’s disrupting the old order (users accessing resources from one place, through one point of access) and replacing it with convenient anytime-anywhere access. Yes, anywhere-anytime makes employees more productive and your business more agile. But there’s a dark side to disruption: the changing traditional perimeter around the organization, which creates […]

Read More

I often ask myself the above question. Given my line of work in cybersecurity awareness, I guess that’s no surprise. But it’s not just a work question. I’m not just talking about what we all want our employees to know about cybersecurity. I’m asking, what do you wish your mom, your brother, your wife, and […]

Read More

A different look at the ‘Equifax’ fiasco I promise that I will not dog pile with my article to the long list of pseudo-experts who are arm chair quarterbacking and providing their ‘so-called’ incisive reasoning on why this happened and what could have been done to prevent it. #NoSir/Madam. Rather, I will take on a […]

Read More