Prevention is Ideal, but Detection is a Must

We all know that one of the key mottoes of information security is “Prevention is Ideal, but Detection is a Must”. In the late 1980s and early 1990s with proper threat analysis enterprises had a chance to protect their networks, systems and data but today the threat landscape is changed and, above all, it will…

Cybersecurity to be the Next Big Campaign Issue?

We’re a few weeks removed from Election Day, and while I’m thankful that I’ll get a temporary reprieve from debates on the same old issues (economy, jobs, gun control, etc.), I couldn’t help but notice the lack of attention paid to cybersecurity.  I suppose it’s not altogether surprising, digital threats are not as buzz worthy…

Doing More with Less: The Latest in Security Analytics

Nearly a year ago, RSA launched Security Analytics — a game changing solution that effectively transformed the SIEM space by converging logs and network security monitoring into one solution. We have already seen a tremendous response to RSA Security Analytics amongst our channel partners who have adopted the technology and are experiencing great success with…

Security Gaps May Leave Online Retailers Under-prepared for Cyber Monday – Podcast #251

A new RSA-commissioned study conducted by the Ponemon Institute pegs the cost of fraud and online disruption losses coinciding with Cyber Monday at up to $3.4 million per hour. RSA’s Rueben Rodriguez talks about the study which surveyed 1,100 IT staff inside of retail organizations in the U.S. and UK. http://rsa.edgeboss.net/download/rsa/2013/ponemon_podcast_final.mp3Podcast: Play in new window |…

Securabit ECAT Podcast Feb 22nd: Old wine in a new bottle

Our colleagues at Securabit will be hosting a live Podcast on February 22nd around 7:30PM with Pascal Longpre, our founder and CTO. It’s titled, Old wine in a new bottle: Why new variants of old malware keep slipping through. We’ll drill down on TDL4 and SpyEye in particular, discussing how new variants have low detection…

Is There a Cyber Doctor in the House?

Given the increased complexities and sophistication of cyber adversaries today, the demand for skilled IT security practitioners has outweighed the supply —  particularly those skilled in security operations, intelligence, data analytics and forensic analysis. Drawing parallels to healthcare, increases in medical device, imaging, research/development and clinical care has involved much the same way. These advances…

Beautiful Women Make for Excellent Hackers

There’s nothing particularly revelatory in saying women hold certain powers of persuasion over men. Odysseus was nearly shipwrecked by beckoning Sirens, St. John the Baptist was beheaded at the request of a gyrating Salomé, and I, in third grade, gave some of the more prized Beanie Babies in my collection to Shawna Jones because she…

Ransomware for Real: An IT Horror Story Coming to Your Organization

I was speaking on a panel at IT Nation 2013 in Orlando this past week about the changing threat landscape for managed service providers, and an interesting and unexpected topic seemed to dominate the audience-panel Q&A. I’ll tell you the topic but first I’ll need 10,000 Bit coins wired to me. Just kidding. As you…

Becoming the Next Generation Security Analyst

I love airplanes – who doesn’t? I watched a documentary the other night about how fighter jet technology is becoming so sophisticated that pilots just cannot keep up. Jets now fly so fast and maneuver so quickly that the average pilot physically cannot endure the environment; they will pass out from the G Forces. What…

Gartner IAM Summit Kicks Off Today

Billed as the “premier gathering for IT and business professionals responsible for creating, implementing, managing, and improving IAM programs,” the Gartner Identity & Access Management Summit begins today in Los Angeles. As in previous years, the three-day event will provide insights and recommendations for professionals seeking to implement an effective IAM solution. However, a major…