contributor

Recent Posts

Equifax Deserves the Corporate Death Penalty

by contributor | Oct 23, 2017

Interesting perspective from Ron Fein over at Wired. If this happens, what is the precedent for other industries like healthcare or banking? Are you in favor of shutting down companies that don't...

Want stronger passwords? Understand these 4 common password security myths.

by contributor | Oct 7, 2017

Fahmida Y. Rashid at CSO online recently wrote an article on passwords that's worth a look at. She takes the approach of disrupting our current assumptions on password security, and she makes some...

Beware Equifax-Based Phishing Schemes

by contributor | Sep 13, 2017

In the aftermath of the Equifax breach, everyone should be on high alert for subsequent social engineering attacks. I would expect LOTS of phishing messages to hit Inboxes over the next few weeks,...

SIEM challenges: Why your security team isn’t receiving valuable insights

by contributor | Sep 8, 2017

I thought this was an interesting article as I've seen some banks struggle with the reporting mechanisms in their SIEM. Something to look at if you have a SIEM, or are thinking about getting one. ...

The 5 cyber attacks you're most likely to face

by contributor | Aug 28, 2017

Roger A. Grimes recently wrote an article for CSO Online discussing the fact that organizations need to focus on the attacks they are likely to face rather than the attacks that are in the news....

3 Questions Successful Security Leaders Should Ask

by contributor | Aug 21, 2017

Today's security executives are increasingly expected to possess a strong business acumen in addition to their expertise in managing risk. This means they must have the ability to communicate the...

6 Steps to Secure Remote Access

by contributor | Aug 7, 2017

Remote access has been a concern since the dial-up days of the internet's infancy. But ubiquitous connectivity only increases enterprise security concerns, says Bomgar's Sam Elliott, who outlines six...

Understanding Small-Business Cyber-Insurance Marketplace

by contributor | Jul 31, 2017

The cyber insurance universe is still in its infancy. There will be many changes over the next couple years on the coverage, reaction procedures, premium pricing, and claim stipulations. I also would...

'Security isn't a special flower; it’s another piece of business, like finance'

by contributor | Jun 30, 2017

A nice article by The Telegraph on the culture of cybersecurity, and what organizations can do to establish or improve their own. Click below to read the full article at the author's website:...

Phishing Attacks - Do's and Don'ts to Protect Your Company

by contributor | May 29, 2017

Our friends over a Rebyc Security recently wrote a post on phishing "Do's and Don'ts". In today's world, a phishing attack is one of the most successful means a hacker uses to gain access to your...

Want these articles delivered weekly to your inbox? Subscribe to our Newsletter!

Recent Posts

Stay in the Loop!