6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

The most effective way for divining the current state of enterprise cybersecurity practices is to talk to a number of CISOs representing different industries and to distill those conversations into an overall model.

05/08/18

Sometimes encryption can actually make you less secure

Sometimes encryption can actually make you less secure

In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back.

03/05/18

Anatomy of a well-run red-team exercise

Anatomy of a well-run red-team exercise

Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack.

01/22/18

How ready are you to stop an advanced attack?

How ready are you to stop an advanced attack?

How you perform in the face of well-run red team exercises is the closest you can come to knowing how you will deal with a real-world advanced attack.

12/12/17

Who wins in a world of 100% encrypted traffic?

Who wins in a world of 100% encrypted traffic?

With advances in artificial intelligence, security doesn’t have to come at the cost of privacy.

11/06/17

Load More