Why Hackers Are in Such High Demand, and How They’re Affecting Business Culture

News headlines often focus on the hackers who launch cyber attacks and leak confidential data such as National Security Agency exploits, sensitive political emails, and unreleased HBO programming, but hackers can also affect organizations in positive ways. White hat hackers (as opposed to black hats) increasingly are finding employment in companies as security researchers. From conducting penetration […]

An Effective Cyber Hygiene Program Can Save A Business

According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error. For example, 63 percent of breaches leveraged weak, default, or stolen passwords, and 12 percent of breaches involved clicking on a malicious link or attachment. Left uninhibited, employees will behave how they choose when they are […]

What is identity management? IAM definition, uses, and solutions

Identity and access management, or IAM, in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. The core objective of IAM systems is one identity per individual. Once that digital identity has been established, it must be […]

8 Steps for Building an IT Security Career Path Program

Cybersecurity professionals are in steep demand, given the projected shortfall of 1.8 million workers by 2022. But organizations can both retain their coveted cybersecurity team members so they don’t get hired away, as well as attract new talent amid competing job offers – by creating a career path program. A majority of companies don’t provide such a […]

Ransomware Detection 101: Six Best Practices To Prevent Propagation And Minimize Damage

Research shows that, on average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware is a type of malware designed to either block access to a victim’s data, or threaten victims with publishing or deleting data, unless a ransom is paid. While the threat vector has been around for years, it’s now becoming […]

How CSOs Can Adapt to the Changing World of Digital Risk

Picture this, a large organization has been hacked, compromising the financial information of millions of people. News headlines detailing similar stories are now frequent, causing the job description of CSO to rapidly expand. In the past, the main responsibility of this role has been managing the physical security of an enterprise. But in today’s dominantly […]

How Not To Uber Your Data Breach: A Guide For Handling A Cyber-Attack

You know something’s gone wrong when you make Equifax’s handling of their data breach look good. In what has arguably topped the list of the worst cyber-attacks of 2017, Uber is now facing global scrutiny for a data-breach it’s concealed for the past year. The attack saw hackers steal the personal information of 57 million drivers and […]

Why Enterprise Security Is A Matter Of Policy

Ever since the first firewalls were deployed on business networks in the early 1990s, enterprise security goals haven’t really changed:  keep the bad guys out, and ensure that only authorized users and software are allowed to communicate over approved network paths.  Sounds simple enough, right?  And in those early days, those goals were relatively easy […]

Security Leaders Must Adjust Cybersecurity Budgets to Effectively Address 2018 Cyber Threats

The natural trend in the cybersecurity industry is that spending money means you’re more secure; however, this isn’t always the case. While cybersecurity budgets will continue to increase in 2018, they will be increasingly focused on areas that will be most effective. We have observed over recent years most exploits lead back to unpatched or […]

Why Third-Party Security is your Security

Depending on third parties is inescapable. Every organization needs software, hardware, Internet connectivity, power, and buildings. It’s unlikely they’re going to do all those things themselves. That means that organizations must be dependent on others outside themselves. With that dependence comes risk. Managing third-party risk isn’t just a good idea, in many cases, it’s the […]