Just Let Me Fling Birds At Pigs Already! Thoughts On The Snowden / Angry Birds Revelations

“But until a person can say deeply and honestly, 'I am what I am today because of the choices I made yesterday,' that person cannot say, 'I choose otherwise.'” ? Stephen R. Covey, The 7 Habits of Highly Effective People: Powerful...


Still On Windows XP? Time To Review Your Options

Does your organization still have a significant number of endpoints still running Windows XP? Don't worry, you're not alone- Forrester's Q3 2013 Hardware Survey shows us that the average organization still has 20% of their employee...


LG Is Learning An Embarrassing Privacy Lesson In The Age Of The Customer

In a recent report titled “ Technology Management In The Age Of The Customer ,” Forrester defines the Age of the Customer


Rise Of The Second Mobile App War

Starting with the


Point Solutions Must Die

Last year I wrote a blog post titled, “ Incident Response Isn’t About Point Solutions; It Is About An Ecosystem ."  This concept naturally extends beyond incident response to broader enterprise defense.  An ecosystem approach pr


Five Common Legal & Regulatory Challenges With Social Media

It should come as no surprise that regulators and organizations alike struggle to set and enforce guidelines for social media activity.



Rick Holland asks, why are we still talking about counter attacks by the private sector against cyber criminals?


Deloitte Acquisition Signals Push By Consultancies Into MSSP World

Will Deloitte's acquisition of Vigilant start a run by consultancies to add MSSP businesses to their portfolios? Forrester's Edward Ferrara provides analysis on the acquisition and its impact on the market


Cloud Security - Expect Accelerate Deployments Due To Strong Moves By Providers To Improve Security

Forrester research has always identified security as a major impediment to broad scale implementation for cloud, regardless of the model, SaaS, PaaS, IaaS, the adoption rate has been slowed by security concerns. Cloud providers...


Data Privacy Heat Map Shows Increasing Global Momentum Towards Data Protection Standards

As data flows between countries with disparate data protection laws, firms need to ensure the safety of their customer and employee data through regulatory compliance and due diligence. However, multinational organizations often find...


AP’s Twitter Hack: This Isn’t About Twitter’s Security Protocols, It’s About Yours

Let’s put it this way: social media and security don’t work together very well today. Marketing professionals who see social media as a vital communication channel view security as a nuisance, whereas Security pros view services like...


Observations On The 2013 Verizon Data Breach Investigations Report

I was very excited to finally get a copy of the much-anticipated 2013 Verizon Data Breach Investigations Report (DBIR.) I have found the report to be valuable year after year. This is the 6th iteration and this year’s report includes...


Two-Step Verification Will End Consensual Impersonation

A couple of months back, I advocated killing your password policies and applying some other techniques instead to make existing use of passwords more effective (including my hobby horse: take the user-experience sting out of rotating...


RSA 2013: The Age of Security Commercialism

RSA 2013: The Age of Security Commercialism

Walking on the RSA 2013 show floor, it was a chaotic, noisy, and energetic place, pulsing with excitement. The industry has reasons to celebrate; the security space is white hot, with more VC money pouring into the space than ever...


Facebook’s Security Breach: Reputation On The Line Now More Than Ever

One thing from this breach is very clear: Facebook’s reputation and business model are on the line now more than ever before. Consumer trust is one thing the social network can’t afford to lose.


Kaspersky: A Fast Growing Company That Is Seeing Challenges For The First Time

Kaspersky is an interesting company. In the last 10 years, they came out of nowhere, built a global brand, established their founder Eugene Kaspersky as a cybercrime-fighting celebrity in popular media (see the Vanity Fair and Wired...


Do You Think Of Consumers When It Comes To Data Security Controls?

Your customers are consumers too. They don’t turn into business bots when they set foot in the enterprise. Whether your organization sells a product or a service to enterprises or consumers, you’re interfacing with consumers who have...


Bit9's Operational Oversight Is Probably Your Operational Reality

You are now no doubt aware that Boston based security firm Bit9, suffered an alarming compromise, which resulted in attackers gaining access to code-signing certificates that were then used to sign malicious software. See Brian Kreb’s...


The Atlantic Ocean Divides Financial Aspirations For CISOs In 2013

As 2012 came to a close, we studied the financial position of many CISOs and asked about their expectations for 2013. Unsurprisingly, it was apparent that 2012 was another difficult year and that CISOs had been keeping their belts...


Make a resolution: Kill your P@55W0RD policies

It has finally become hip not just to predict the demise of passwords, but to call for their elimination. The recent Wired article makes an eloquent case about the vulnerabilities that even "strong" passwords are subject to, such...


Load More