A couple of years ago, I had a conversation with a CISO that has stuck with me. His Board of Directors had dramatically increased...
Hi, what are you looking for?
A couple of years ago, I had a conversation with a CISO that has stuck with me. His Board of Directors had dramatically increased...
Crypto-mining Malware Exposes Organizations to a Host of Monetary and Reputational Risks
From hacked IoT devices to corporate infrastructures hijacked for crypto-mining to automated ransomware, novel and sophisticated cyber-attacks are notoriously hard to catch. It is...
Very Little is Being Done to Combat Insider Threats
The Most Effective Security Teams Aren’t Necessarily the Largest or the Most Experienced
The high-profile attacks of 2017 saw cyber defense rise to the level of boardroom concern. However, a look back to the past year reveals...
After more than 145 million customer records were compromised in the Equifax data breach, the company’s stock plummeted by more than 30 percent. That...
Working with technical officers and cyber security specialists around the world, our conversations often center around a few key themes – the risk posed...
Novel cyber-attacks will ruin reputations and erode customer trust, but can humans keep up in the cyber arms race?
The recent WannaCry ransomware outbreak is yet another wake-up call. Humans alone can no longer be expected to manually respond to brazen, fast-spreading cyber-attacks...
There’s a new challenge in cyber defense and it’s coming from everyday objects that increasingly surround us — the Internet of Things (IoT). From...