Public and private partnerships help fortify critical infrastructure

Building public and private partnerships is imperative to protecting a country’s critical infrastructure, according to Steven Gutkin, deputy director at the New Jersey Office of Homeland Security and Preparedness. Gutkin spoke with SearchCIO at the recent Fusion CEO-CIO Symposium, produced by WTN Media. Read the interview with Steven Gutkin, deputy director at the New Jersey Office […]

Mitigate Risk And Optimize Security Spend

Cognitio is a strategic consulting and engineering firm established and managed by a team of former senior technology executives from the U.S. Intelligence Community and the Financial Sector. Our team has a track record of proven past performance across multiple sectors of the economy. We are known for our ability to help firms mitigate risks […]

Cybersecurity Risk Is Real: SSI’s 2017 Physical-Logical Security Assessment

Hard as it may be for some to believe in 2017, the electronic security profession is only about three years removed from all but those considered alarmists and fringe-dwellers dismissing cybersecurity as having little relevance to industry practitioners. Read more about the physical-logical security assessment report by SSI for 2017 on Security Sales & Integration.

IoT, encryption, and AI lead top security trends for 2017

The Internet of Things (IoT), encryption, and artificial intelligence (AI) top the list of cybersecurity trends that vendors are trying to help enterprises address, according to a Forrester report released Wednesday. Read about the new report by Forrester which reveals that Internet of Things, encryption and artificial intelligence are the top cyber security trends of […]

‘Sizable Proportion’ Of U.K. Businesses Have No Formal Approach On Cyber Security

Read Dina Medland’s article about why United Kingdom businesses top the cyber attacks charts on Forbes : The U.K. government could be forgiven rising levels of frustration when it comes to the approach taken by many businesses on cyber security. Although three in ten (31%) now say it is a “very high” priority for their senior […]

Few risk managers know what to do in the event of a workplace emergency

Fifty risk managers gathered in a conference room to discuss the problem of workplace violence. When asked, only two said they knew exactly what to do in the event of an emergency. Unfortunately, workplace violence is a feature of modern business life, and risk managers must be prepared for the possibility of a worst-case scenario. […]

Is geopolitics hurting bottom lines? The case of Proctor and Gamble

If your bottom line is suffering, you may need to reconsider the role of geopolitics. Proctor and Gamble suffered a 1 percent decline in earnings this past quarter, and executives are blaming the current geopolitical and economic environment. They say global instability, sluggish growth, and foreign exchange troubles have all undermined consumer demand for their […]

Why the world needs better data-sharing to combat the terror threat

Data-sharing between governments allows for better coordination of intelligence resources and therefore better responses to global terrorism. That’s why top U.S. and European military chiefs are calling for better information sharing between their respective countries. The commander of the U.S. European Command cited the transnational nature of terrorist groups and their increasing reliance on encryption […]

Profiling The Insider Threat – Breaking Down a Complex Security Term

Read Dr Jamie Graves’ article about how to deal with insider threats on Infosec Magazine  : From a disgruntled employee looking to destroy IP, or an opportunist looking to make money by selling data, all the way to a security-naïve worker that might unwittingly let criminals into your network without knowing it, there are dozens of […]

How to Prevent Costly and Dangerous Cyberattacks

Read Greg A. Hood’s article about how businesses can prevent costly and dangerous cyber attacks on Medscape : There are two types of practices: those that have been hacked, and those that probably will be hacked. Large and small practices are vulnerable to data breaches. However, many resources are available to thwart an attack, and […]