Gotham City, I’m out of the office. — B

Do you sometimes get the feeling that eventually everything will be ok…?! Well, many organizations these days are taking that approach when it comes down to securing their most important assets. It can be an issue with focus, priority, budget, you name it! At the end of the day, many organizations are either waiting for…

The Sony Pictures Incident: Don’t Wait to Act

While breach disclosures have been coming at a far too rapid pace the past several months, reports Monday from an alleged compromise at Sony Pictures paint a troubling picture of the escalating nature of many compromise events. According to sources, attackers claim to have compromised the network of Sony Pictures, and threatened to disclose proprietary…

Security’s Latest ‘Thing’

If you’ve been around the security industry for even a few years you start to realize that the focus of the industry shifts every few years in order to address the changing realities of the IT infrastructure, the threats landscape, and, to some degree, the new buzzwords that vendors come up with. The shifts in…

Oops, They Did it Again…

Another day… another credit card breach letter in the mail …and yet another card to throw away….. While talking to my mailman the other day I noticed he lost some weight. Ironically, he thanked the many credit card breaches to his improved physical fitness. (guess there is a silver lining to anything) He also expressed…

Beware Of Things That Don’t Go Bump In The Night

Picture a movie that depicts an intruder entering a house. There is a noise and typically the wife asks her spouse, “honey I heard something”. The lights go on and the husband descends the steps to the main floor with a bat in hand to apprehend the perpetrator. It is ironic that the same response…

When You Have Eliminated the Impossible

In order to prepare for and identify a security incident in today’s cyber landscape, it is necessary to gain a thorough understanding of the content and context of the networks and systems you are protecting. Alerts on possible malicious activities can come in many different forms; security tools, end-users, business partners and third parties such…

The Changing Role of Security

I was recently re-reading the Ponemon Institute’s ‘2012 Global Encryption Trends Study’, where they interviewed 4205 IT professionals worldwide to evaluate how organizations are handling encryption strategy these days, and one statistic really jumped out at me – only 14% of the responders indicated that IT Security was responsible for driving the organization’s encryption strategy…

We are connected to WHO?!?!

Party lines.  Since we just finished an election cycle, I am sure you have heard that phrase many times over the last few weeks.  However, I am not referring to the propensity of political candidates to stoutly stand for or against a referendum based on their political party.  I am actually referring to a long lost…

I Want a Ferrari

If there’s one essentiality in business, it’s this: you can never be complacent. Ultimately, consumer trends are going to change, and you want to be the organization ahead of that change. One great example that comes to mind as far as an organization driving change and unconventional thinking is Ford. The assembly line in the…

Veterans Day and Cybersecurity

As Veterans’ Day approaches, I have a couple of thoughts. First, I’m thankful for all of the sacrifices our Veterans have made, that in so many ways it is difficult for many to understand or even discuss. But I also want to thank all of the families and friends who through good and bad have…