2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year.

Combatting extreme weather and power outages, a growing need for AI

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...

Different conferences, common theme: How to best manage the disparate security solutions we’re using

Different conferences, common theme: How to best manage the disparate security solutions we’re using

We need to unite the different islands of security solutions in both the physical and cyber worlds to provide the best level of protection.

Sharks and phishers are circling, looking to snag a bite

Sharks and phishers are circling, looking to snag a bite

Security professionals need to work together to come up with effective threat strategies, better training and intelligence alert systems in effort to keep phishing attacks at a minimum.

Emerging security threats at the half-year mark

Emerging security threats at the half-year mark

We’ve hit the halfway mark of 2019, and I’m sure that we have all noticed some interesting happenings in the cybersecurity world. I’d like to highlight a few that I’ve found interesting, but also disturbing – and I am sure that there...

The ethical use of data

The ethical use of data

When thinking about data privacy and security, the focus is typically on how to keep the bad guys from gaining unauthorized access to our data. We spend billions of dollars every year as an industry to protect our data, and that of...

Consolidation: Why there should be big acquisition announcements at RSA

Consolidation: Why there should be big acquisition announcements at RSA

The question isn't if, it's when one of the major tech companies will announce a big security move. If they don’t, they're at risk of falling behind.

Breaches, market volatility and the government shutdown: Security in the crosshairs

Breaches, market volatility and the government shutdown: Security in the crosshairs

If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...

More AI, consolidation and regionalization coming in 2019

More AI, consolidation and regionalization coming in 2019

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

Will your company be valued by its price-to-data ratio?

Will your company be valued by its price-to-data ratio?

The job of every security professional is to protect their organization’s price-to-data ratio. In the past, it was typically the Sales and Marketing teams in the hot seat driving a company’s valuation by maintaining sales goals to...

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

Our electric grid is vulnerable to cyberattacks. Here’s what we need to do

As more state-sponsored cyberterrorists and rogue actors take aim at bringing down the U.S. power grid, the government and private utility companies need to coordinate efforts to mitigate the chances of what could be a major...

Rough trade: Why financial markets will need to stay on top of their game

Rough trade: Why financial markets will need to stay on top of their game

While election hacking is making headlines and Dan Coats is warning about 9/11 style cyberattacks on the US, it is our financial markets that may require the most immediate laser focus. The future preservation of our financial...

2018: The year data privacy got real

2018: The year data privacy got real

As a company executive, it is critical to understand how your business stores, shares, analyzes and protects its core private data, particularly that of customers and employees. Today, this is a monumental task – machine learning...

The AI hype machine – let’s be careful out there

The AI hype machine – let’s be careful out there

AI over-marketing by security vendors is poised to confuse, frustrate and ultimately disillusion potential customers. We’re at a challenging point in the early maturity of the AI market: now is the time to set proper expectations so...

Bridging the realms between cyber and physical security

Bridging the realms between cyber and physical security

Can there be better automated incident response for physical security?

How benchmarking can make your job much less stressful

How benchmarking can make your job much less stressful

From better understanding to stronger defense to self-preservation, industry-wide benchmarking data could provide a whole host of benefits to organizations willing to embrace it.

Intel’s chip vulnerabilities don’t bode well for the spread of ransomware

Intel’s chip vulnerabilities don’t bode well for the spread of ransomware

Traditionally, ransomware security was based on matching viruses to a database of known malware. AI offers a more dynamic approach.

Can AI eliminate phishing?

Can AI eliminate phishing?

Phishing continues to plague consumers and businesses alike. Is artificial intelligence the answer to solving this persistent security headache?

Top Blog Posts