What is Threat Hunting and Why Do You Need It?
Hackers are getting more elusive. (more…)
Types Of Common Malware Attacks
Malware remains a massive security problem, costing companies billions each year to manage, mitigate and remediate. While the term itself is straightforward — malware refers to any software designed to cause harm on a system or device — there are a host of malware types and techniques used by attackers to circumvent defenses and compromise key systems.
(more…)
Sedona Conference Just Leveled the Playing Field with Reasonable Security
To the corporate CISO cybersecurity breaches are a one-two punch. The first punch is, of course, the attack or mistake that caused the breach. Nobody wants to be caught unprepared, or to be the cause of harm to anyone who may be exposed by a breach. The second punch, so say the statistics, is the more damaging one. (more…)
Half of Your Cybersecurity Adversaries Just Disappeared
It’s fair to say that two adversaries contribute to the costs of cybersecurity incidents: the attackers and the lawyers. On February 16 the lawyers became your allies. (more…)
The Limits of Cybersecurity Benchmarking
Quick: Where do you go to find the cost-per-record of a data breach? Reports from the Ponemon Institute? The annual Verizon Data Breach Investigations Report? How about the NetDiligence Cyber Claims Study? These are all credible and popular sources for breach cost benchmarking, but they give drastically different answers to the question. (more…)