Key lessons from the 2016 Verizon data breach incident report
The annual Data Breach Incident Report (DBIR) is out and reinforcing the value of well-established cybersecurity practices. The good folks at Verizon Enterprise have once again published one of the...
View ArticleWill your cloud be at risk?
The Cloud is both compelling and alluring, offering benefits that entice many organizations into rapid adoption. The attractiveness of lower operational costs, powering new service offerings, and...
View ArticleCan zealous security cause harm?
Good security is about balancing Risks, Costs, and Usability. Too much or too little of each can be unhealthy and lead to unintended consequences. We are entering an era where the risks of connected...
View ArticleWhat cybersecurity data should you trust?
The limitations of security data We are constantly being bombarded by cybersecurity data, reports, and marketing collateral—and not all of this information should be treated equally. Security data...
View ArticleIntel is innovating to stop cyber attacks
Intel, in partnership with Microsoft, has published a technology preview, showing how innovation in silicon architecture can help protect against advanced code-reuse attack techniques. This is an...
View ArticleFighting Back Against Ransomware
Ransomware is a specific type of attack which involves malware that encrypts files and extorts money from victims. It is quickly becoming a favorite among cyber criminals because it is easy to...
View ArticleThe Fun of Tax Fraud Phishing Robocalls
Yesterday while at work, I received the joy of a phone phishing Tax Fraud voicemail. I saw the unknown number appear on my cell phone while in a meeting and did not answer. But a little present was...
View ArticleHow Good is Your Data Breach Response?
Data breaches are commonplace and every organization who handles sensitive or private data should have a proper capability to respond to an incident. Many companies have a basis set of procedures,...
View ArticleCryptocurrencies are a Target for Cybercriminals – The New Risks of...
All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. It is the Willie Sutton principle. Willie, a famous bank robber...
View ArticleCryptocurrencies are a Target for Cybercriminals – Social Platforms are Next...
Continuation from part 1: Cryptocurrencies are a Target for Cybercriminals – The New Risks of Innovation Cyber criminals are always looking for victims and ways to exploit them. Stealing what is...
View Article
More Pages to Explore .....