What to do with the last of your 2017 cyber security budget?

Posted by:

Late in the financial year, it can difficult to figure out the best way to spend what’s left over in the information security budget.

No one wants to leave money on the table, especially when it could significantly reduce your exposure to cyber risk. The problem is that for any experienced IT security lead, you know there are thousands of ways that money could be spent: training, new security software, hardware upgrades, policy or system reviews, etc

Any of ...

Read More →
0

Getting ahead of a new breed of Ransomware

Posted by:

We typically understand a ransomware attack to be a demand for payment in return for decrypting files. But evolution, even in malware, is inevitable. A fairly new disruptive cyber cell known as The Dark Overlord is relying on the threat of reputation damage to “encourage” its victims to pay up.

You might be thinking that reputation damage wouldn’t be enough to make your firm shake in its boots, but you’d be wrong. These Dark Overlord cyberbullies use nasty tactics ...

Read More →
0

IoT Developers: checklist for building more secure Smart Devices.

Posted by:

[This is Part 2. Part 1 of this blog series is here: Before you buy or connect a smart device (IoT)…]

Having worked for more than 20 years in the technology and information security industry, I have seen first hand how hard management can push their teams.

There is no doubt that the IoT race is on, but whipping teams into a frenzy so that they race through the development, testing and production phases has a real ...

Read More →
0

Before you buy or connect a smart device (IoT), read this!

Posted by:

The Internet of Things (IoT), as a term, has been bandied around a lot over the last few years.

Many people – even those that work in the technology sector – are still unclear on what IoT really means.

In this blog series, we will define IoT, talk about why infosecurity experts are concerned, and delve into some of the issues facing both providers and consumers.

We’ll also provide some practical recommendations for both parties:

  • Consumers of IoT devices: Tips for choosing the right IoT ...
Read More →
1

CISOs, Do you have enough resources to do your jobs? No, we didn’t think so.

Posted by:

Be honest – how many of you CISOs out there are relying on a kind of “Fingers Crossed” approach when it comes to protecting your most valuable organizational assets?

If you are nodding quietly in answer to this question, you’re not alone.

We get it. The role and responsibilities of the CISO have changed dramatically since the role’s inception in the 1990s.

20 years ago, CISOs were focused on securing and defending the network perimeter. This meant ensuring firewalls were configured properly, vulnerabilities ...

Read More →
0

Lessons learned from the Equifax Breach – Part 2

Posted by:

Here is Part 2 of Lessons learned from the Equifax Breach. See Part 1.

Own up, make changes and say sorry:

According to Whois, Equifax registered their Equifax Security 2017 site (would Equifax insecurity have been a better name I wonder?) in late August. Incidentally, this is a month *after* they claim to have witnessed suspicious network traffic associated with their US online dispute portal.  

Yet they only informed the world via ...

Read More →
1

Lessons learned from the Equifax Breach – Part 1

Posted by:

First, Props to @briankrebs for the evil Equifax logo. 

While those unaffected by the Equifax breach have been stuffing their faces with proverbial popcorn as they watch the latest unveilings and press announcements, those worried that their most sensitive and identifying details have been leaked simply look on in horror, unknowing how to proceed.

The exact details of how the hackers made off with so much data remain fairly obscure. Equifax has

Read More →
1

Top 4 cybersecurity headaches plaguing Financial Services Institutions

Posted by:

Most Financial Services Institutions (FSIs) have digital technology at their core. And a primary responsibility for most FSIs is “cyber-connect” customers – be they organizations or individuals – with their money simply and seamlessly.

FSIs need to counterbalance these speedy, frictionless transactional experiences against the thousand-pound gorilla in the room, a.k.a: cybersecurity risk.

This Deloitte article in the Wall Street Journal distills the problem well: “Amid the massive technological transformation now underway in financial services, companies are being asked to become ...

Read More →
0

Tips for getting your IT security budget approved

Posted by:

“Many boards now have a clear focus on information security risks. This is not always reflected across the broader organization. Security and risk management professionals must manage and defend security budgets to meet stakeholder expectations of protection.”

These words, published on the Gartner website, are frustratingly true for many firms out there.

CIOs oversee the accessibility, confidentiality and integrity of files and systems. This means they must introduce new and maintain old systems, ensuring everyone can who ...

Read More →
0

When cheaper is not better: a quick guide to penetration tests

Posted by:

An IT administrator recently vented his frustration about having to conduct a penetration test.

He wanted an in-depth assessment of his system to make sure his network was operating with a low risk profile, all while still making all the required services available to his users.  

His firm has cloud services, several sensitive databases, internal and external networks, not to mention multiple operating systems (the designers “demanded” Apple products).

The idea was ...

Read More →
0
Page 2 of 12 12345...»