Baby steps: building a cybersecurity strategy

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

There is currently a projected shortfall of 1.6 million qualified persons to fill cyber security roles. Since it is very clear we are vulnerable to cyber attacks and need to mitigate them we need people now. Complaining about...

Why you can’t afford not to train veterans in cyber security

Why you can’t afford not to train veterans in cyber security

By 2019 ISACA estimates over 2 million cyber security roles will remain unfilled. A natural solution to this problems is retraining veterans to fill these positions.

10 facts every small business leader must act upon

10 facts every small business leader must act upon

Small businesses aren't immune from attack. In fact, a recent Ponemon study revealed 55 percent of small businesses surveyed have been compromised. Small business leaders need to understand 10 key fundamentals and take immediate...

Why every leader needs to understand Apple vs. FBI

Why every leader needs to understand Apple vs. FBI

We must avoid any solution that provides a master key to any encryption technology. Violating the privacy of our citizens must remain the exception and not the rule.

Why your security strategy should not be created in a vacuum

Why your security strategy should not be created in a vacuum

Sound strategy supports the core business processes of the organization. It should be (as we often said in the military) a combat multiplier. Meaning it should bolster, strengthen, and galvanize each of the efforts of each business...

Why written policies are vital to your cyber strategy

Why written policies are vital to your cyber strategy

Policies predefine how our organizations will protect against cyber incidents. They outline the processes that will be used on a daily basis as well as the steps to take when an incident occurs. Essentially, they do all the heavy...

Creating a strategy to offset the cyber talent shortage

Creating a strategy to offset the cyber talent shortage

A record 79 percent of U.S. businesses reported a cybersecurity incident in the last year, and the 238,158 job postings for cybersecurity-related jobs in 2014 is an increase of 91 percent from 2010. In the U.S. alone, companies posted...

Why desensitization is ruining your security strategy (part 1)

Why desensitization is ruining your security strategy (part 1)

Our information security teams are understaffed, overworked, and a result are becoming desensitized to the tell tale indicators of compromise showing up wishing our enterprise infrastructures.

5 myths that will thwart any security strategy

5 myths that will thwart any security strategy

We have to stop relying on outdated and unsupported information. Crafting successful (business driven) security strategy relies upon being accurately informed.

How to create effective cyber strategy

How to create effective cyber strategy

In 60% of reported cases attackers compromise an organization within minutes. Only 25% of those organizations discover the compromise within days or less. 70% of attacks use the initial victim to target a secondary victim. No one is...

4 tips to keep your career relevant

4 tips to keep your career relevant

In order to build a thriving career within the information security industry first and foremost you must become relevant. If you want to become relevant you need to develop these skills.

Think your security strategy is up to par? Think again!

Think your security strategy is up to par? Think again!

The strategies that protected our organizations in the past are no longer relevant today. Attackers will leverage trust relationships, human weakness, and technology to subvert our defenses. Our security strategies must reflect the...

Top Blog Posts