Mobile malware – same attacks – different pathogens

Mobile malware – same attacks – different pathogens

I’ve been blogging about mobile attacks and how they can be different than attacks on more traditional platforms. For example, I wrote about: Mobile phishing – same attacks – different hooks Mobile pharming – same attacks –...

08/11/16

Mobile pharming – same attacks – different seeds

Mobile pharming – same attacks – different seeds

I recently wrote a blog on mobile phishing titled: Mobile phishing – same attacks – different hooks. There was so much feedback that I’ve decided to a write a few more posts around mobile security differences. Since I’ve already...

08/09/16

Mobile phishing – same attacks – different hooks

Mobile phishing – same attacks – different hooks

I spent the last two weeks talking with CISOs, application developers, mobility experts and IoT thought leaders like SRI’s Dr. Ulf Lindqvist. One thing was for certain – mobile is receiving a lot of attention from the...

08/03/16

Mitigating insider threats - a technical perspective

Mitigating insider threats - a technical perspective

Security practitioners must always think dynamically when it comes to trying to develop solutions to counter this threat. Implementing technology solutions at different levels and overlapping functions will best cast a tight-weave...

07/07/16

Federal agencies continue to be lost fighting cyber threats

Federal agencies continue to be lost fighting cyber threats

It will be disappointing if the federal government doesn’t markedly improve its cyber security preparedness. While there has been a lot of attention drawn to hacking back the attackers, implementing cyber sanctions, and bolstering...

07/05/16

Identify the “who” in risk mitigation

Identify the “who” in risk mitigation

Risk management strategies are designed for organizations seeking to improve their resilience in the face of a dynamic and ever-changing threat landscape. Knowing the “whos” will greatly assist organizations in developing unique...

06/29/16

Cyber threats and pharmaceuticals

Cyber threats and pharmaceuticals

We must evolve our security strategies with the threat environment and adapt to the dynamic nature of the threat actors themselves, how they operate, and devise our strategies accordingly.

06/17/16

Insider threat mitigation techniques worth considering

Insider threat mitigation techniques worth considering

In today’s data rich threat landscape, it is no longer enough to just be able to detect anomalous behavior. It is, however, important to be able to detect those meaningful anomalies. Establishing an insider threat detection that...

06/02/16

Ransomware attacks force hospitals to stitch up networks

Ransomware attacks force hospitals to stitch up networks

The lessons to be drawn from recent incidents is the need for hospitals to develop and implement a strong cyber resiliency plan that incorporates incident response as well recovery operations from such attacks. The threat of...

05/19/16

Mitigating insider threats from a people perspective

Mitigating insider threats from a people perspective

Mitigating insider threats is an ongoing effort that requires a holistic approach that encompasses technological as well as human solutions. Additionally, organizational and situational factors can help mitigate the threat posed by...

05/05/16

Cyber threats come from all angles at the financial services industry

Cyber threats come from all angles at the financial services industry

Reputational loss and reduction in customer confidence can severely impact the long-term well-being of a financial institution ill prepared for the threats that they face. Each organization must develop a strategy that finds the right...

04/18/16

Security can be a competitive differentiator

Security can be a competitive differentiator

Organizations that are able to demonstrate that they have cyber security strategies in place to include incident and contingency planning position themselves ahead of competitors that are in the process of developing them or have yet...

04/01/16

How to keep your highly skilled and paid security team happy and engaged

How to keep your highly skilled and paid security team happy and engaged

Employees contribute significantly to an organization’s achievements and a cyber security team is no different. Its value can be measured by the reduced number of security incidents and the speed and efficiency with which those...

03/21/16

CISOs must quickly adapt to any situation

CISOs must quickly adapt to any situation

Today’s CISO is in the unique position of becoming an important conduit between the C-Suite and the operators that keep an organization running. The position is a pivotal spoke in a large wheel having visibility and influence in...

03/08/16

Retaining security talent by embracing distributed team management

Retaining security talent by embracing distributed team management

Ask anyone in a security leadership role about their team and you’ll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder....

02/22/16

How to convince the CFO of the budgetary security need

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of...

02/09/16

5 sins cybersecurity executives should avoid

5 sins cybersecurity executives should avoid

With the advent of 2016, I was tempted to touch upon my thoughts on what the future of the cyber landscape will hold, prognosticating trends and shifts and what the next big threat would be. However, upon deeper reflection and...

01/04/16

Thinking outside the product box

Thinking outside the product box

The dynamic nature of the cyber threat landscape guarantees that the threats and the actors behind them are always evolving, increasing in sophistication in order to circumvent the most robust security devices. As such, our cyber...

12/09/15

The technocracy is over – innovation is here, plan your security accordingly

The technocracy is over – innovation is here, plan your security accordingly

Information technology (IT) is going through an age of “technocracy” decline. Innovations in the IT sector have made way for various platforms that can be leveraged to support employees’ workflows and processes. As a result,...

10/13/15

Tighten up your cyber security strategies now

Tighten up your cyber security strategies now

While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this dynamic landscape. Each individual...

09/18/15

Load More