Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond ...
By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, ...
Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being ...
The recent tragedy at The Pulse nightclub added an extra dimension to the Association of Public Safety Officials (APCO) Annual Conference and Expo in Orlando, Florida this week. More than 2,500 registered attendees are here with just under 300 exhibiting companies.  APCO is the premier industry ...
There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and ...
Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And ...
What does this alert mean? Why is it important? What should I do? Our main takeaway from Infosec London 2016: Cyber security professionals are overloaded with information. And what they really want and need is answers. In the panel discussions, leading CISOs explained the difficulty they experience ...
Catching and investigating cyber attacks feels a bit like detective work. And whenever I think of detectives, one of my favorites comes to mind: Sherlock Holmes. The Sherlock Holmes stories are always a fun read as well as a great mental workout.  I’m always fascinated by the way Sherlock Holmes ...
Terms such as ATM skimming, identity theft, data breaches, scams, kiting, and phishing are becoming all too prevalent in today’s society. In just the last five years we’ve seen large, well-known retail and financial services organizations attacked by hackers and other nefarious individuals looking ...
All you need to do is open a magazine, turn on the news or walk the floor of an industry tradeshow to know that the security landscape is changing.  In previous years security was limited to the protection of physical assets and people—but that is no longer the case.  A convergence is underway that ...
The industry is changing. Security leaders are more business savvy, technology is more sophisticated, and big data analysis and the Internet of Things are driving new levels of intelligence across the globe. The drive to leverage data streams, business strategy and systems to achieve greater ...

Subscribe to Email Updates

Posts by Topic