Whole Foods Market, a supermarket chain that specializes in items that don’t contain artificial preservatives, colors, etc. said on Thursday they’re investigating a payment card breach at the venues of some stores where taprooms and full table-service restaurants are located. The company statement was brief, and didn’t offer any details as to what stores are […]

Read More

Does the training provided to our colleagues, commonly called “whack-a-mole,” actually make a difference? Maybe a better question is why are we still relying on training tired and stressed people on a complex topic instead of searching for a technical solution? I recently talked with Kevin O’Brien (LinkedIn,Twitter), CEO and Founder, GreatHorn about this very […]

Read More

The future leaders of cybersecurity will be fluent in languages other than technology and will stop using fear to conflate the message of vulnerability versus risk. That’s the message that kicked off this year’s (ISC)2 Security Congress conference.  Donald Freese, deputy assistant director at the FBI, and Brandon Dunlap, managing director at Brightfly, talked about […]

Read More

There’s an old saying that change is the enemy of security.  To avoid disruptive changes, many cybersecurity professionals strive for tight control of their environment and this control extends to the management of security technologies.  Experienced cybersecurity professionals often opt to install management servers and software on their networks so that management and staff “owns” […]

Read More

Login credentials and other sensitive data from more than a half million vehicle tracking devices, which continually pinpoint vehicles’ locations, were left unprotected online. The exposed records belonging to SVR Tracking, headquartered in San Diego, were discovered by Kromtech security researchers. Thanks to a misconfigured Amazon AWS S3 bucket, 540,642 account IDs which included logins […]

Read More

DERBYCON – Ransomware is a topic everyone knows about, but unless you’ve experienced a Ransomware attack, it’s hard to really describe and understand the stress associated with these events. This year has seen Ransomware take the top spot when it comes to attention in the security world. A soon to be released study from Holger […]

Read More

Security teams collect a heck of a lot of data today.  ESG research indicates that 38% of organizations collect, process, and analyze more than 10 terabytes of data as part of security operations each month.  What types of data?  The research indicates that the biggest data sources include firewall logs, log data from other types […]

Read More

The cybersecurity market is rife with conferences that feature keynote speakers, industry experts, vendor demos, training sessions, hack-a-thons and professional networking.  Some of the best events are centered on a narrowly defined topic, an industry vertical, or a niche technology. And with CyberTechnologyXchange (CTX), we have a new venue focused on the burgeoning managed security service providers […]

Read More

Mobility is a disruptive technology. It’s disrupting the old order (users accessing resources from one place, through one point of access) and replacing it with convenient anytime-anywhere access. Yes, anywhere-anytime makes employees more productive and your business more agile. But there’s a dark side to disruption: the changing traditional perimeter around the organization, which creates […]

Read More