Celebrating a Red Sox World Series Win, Halloween and IAM

I’m not sure how this day could get much better.  It’s Halloween, my favorite holiday, and last night, the Boston Red Sox won their third World Series in a decade.   If there’s any downside, I had fully prepared to watch a game seven tonight, and now I’m left without a firm viewing option outside of…

Affordable Healthcare Act Raises Cybersecurity Concerns

While Congress feuds over ideological differences in the Affordable Healthcare Act —arguments I will not even begin to summarize in this blog—one issue lost in the debate is that the new healthcare exchange will cause the influx of personally identifiable information to become more susceptible to potential breaches. According to a report in the Washington…

Incident Response Teams are the New (Security) Black

The term that something is the “new black”, was popularized in the fashion industry and is used when a type of clothing or color becomes part of the standard clothing repertoire for fashionably dressed people.  Like the little black dress that is always fashionable and thus a core outfit in a pulled together woman’s wardrobe. …

Remedies for SOC Enterprise Amnesia

In my last post, I discussed a common syndrome experienced by many organizations called “SOC Enterprise Amnesia” whereby the most valuable data (intelligence) gleaned from events/incidents is flushed and forgotten as operational fatigue sets in while the volume of security control and instrumentation data continues to overwhelms the operators field of view. The outgrowth of…

Let’s Accept It; Cybercrime is a Real Problem #NCSAM

A quick look at the news titles around the globe this week paints a dark picture on the status of cybercrime. Some of the relatively less alarming titles include the following: From UK: Isaca CEO Ronald Hale: It’s Free-for-All in Cyber Crime Not Just for the Banks From Azerbaijan: Azerbaijan calls for strengthening fight against…

Former CIA Head Warns of Cyber ‘Mass Shooter’

The RSA Aveksa blog often reiterates the idea of a changing threat landscape, most notably the rise in state-sponsored hacking initiatives and organized crime syndicates as the biggest threat to IT security.   What seems obvious, but is often glossed over, is that these attackers always work in groups; successful, in part, because of their ability…

Brazen Millennials Can Sabotage Workplace Cybersecurity Initiatives

“Our youth now love luxury. They have bad manners, contempt for authority; they show disrespect for their elders and love chatter in place of exercise; they no longer rise when their elders enter the room; they contradict their parents, chatter before company; gobble up their food and tyrannize their teachers.” Reading the above without context,…

The Top 5 Lessons Learned From Insights 2013

Last week, RSA Aveksa hosted our annual Insights customer conference.  Themed the “Right Track to Smart IAM” and conveniently capitalizing on National Cybersecurity Awareness Month, the three-day event  offered nuanced “insights” into the latest in Identity and Access Management (IAM), explored RSA Aveksa customer testimonials, and delved into the specifics of today’s mercurial  IT Security…

How to Win Friends and Influence People

More than ever, information security requires powers of persuasion. To successfully manage cyber security risks in enterprises today, the information security team must lead a cross-organizational effort, get security controls built into business processes and motivate people to take on security responsibilities. This means cultivating connections and obtaining buy-in from a wide-range of stakeholders. Having…

Stop.Think.Connect. With your Mobile Device. #NCSAM

With the popularity and affordability of smartphones and tablets, staying connected is now easier than ever.  As consumers, we welcome the simplicity of the mobile platform, and we tend use our devices for everything from texting to social media to banking and online shopping.  However, as more personal and sensitive data is available on mobile…