Despite our best efforts, cyber attacks are getting more aggressive and sophisticated. The threat of targeted attacks is real, and the cyber security landscape must change with the need for greater vigilance. Today leading analysts are encouraging organizations to deploy solutions that go beyond ...
By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, ...
Aware of the dangers and probability of suffering a data breach, organizations are rethinking their security posture. They realize that the traditional prevention-based security model, based on signature-based perimeter tools, is no longer effective against advanced cyber threats. To avoid being ...
The recent tragedy at The Pulse nightclub added an extra dimension to the Association of Public Safety Officials (APCO) Annual Conference and Expo in Orlando, Florida this week. More than 2,500 registered attendees are here with just under 300 exhibiting companies.  APCO is the premier industry ...
There has been a lot of discussion lately about the cyber skills shortage. No question our industry must do more to provide education about cyber security and to encourage more students to launch down this path. But in the meantime, there is much that can be done to help improve efficiency and ...
Imagining the future of technology is exciting. I remember watching “Oceans 13” and “CSI” years ago, and thinking that the age in which security technologies would reach this level of advancement was far beyond the industry’s reach. At that point, video analytics was in its infancy, going through a ...
Despite the fact that companies invest $92 billion annually on cyber security, 80% of organizations are still breached. Just recently, highly publicized breaches at Acer, Cisco’s GotoMyPC, and Calgary University suggest that on the whole, our approach to cyber defense is fundamentally flawed. And ...
What does this alert mean? Why is it important? What should I do? Our main takeaway from Infosec London 2016: Cyber security professionals are overloaded with information. And what they really want and need is answers. In the panel discussions, leading CISOs explained the difficulty they experience ...
Catching and investigating cyber attacks feels a bit like detective work. And whenever I think of detectives, one of my favorites comes to mind: Sherlock Holmes. The Sherlock Holmes stories are always a fun read as well as a great mental workout.  I’m always fascinated by the way Sherlock Holmes ...
Terms such as ATM skimming, identity theft, data breaches, scams, kiting, and phishing are becoming all too prevalent in today’s society. In just the last five years we’ve seen large, well-known retail and financial services organizations attacked by hackers and other nefarious individuals looking ...
As the world of information grows, so does our need to make conscious, informed and smart decisions. These decisions directly impact safety, a critical component to the operation of any metropolis. Cities today face increased challenges when it comes to safety objectives and the protection of ...

Subscribe to Email Updates

Posts by Topic