As a myriad of industry regulations and legislation have increased complexity in C-suite decision making, CISOs must educate executives on new and evolving risks and why investments in cyber security…
Security
Incident Of The Week: Defense Electronics Manufacturer CPI Succumbs To Ransomwar…
Electronics manufacturer Communications & Power Industries (CPI) was victimized by having its data encrypted and held ransom. Some of its customers include the US Department of Defense and the DoD’s D…
The Cost Of An Enterprise Ransomware Attack
Ransomware attacks are occurring more frequently and the outcomes are having greater impact on organizations than ever before. Little empirical data is available, however, about the outcomes of these…
Phishing Attacks Work Because… Humans
Phishing remains one of the leading methods to target enterprise users and infiltrate the workplace. Phishing has become so disruptive that it is impacting worker productivity and raising questions ab…
Design Flaws In Cyber Security Reports And Related CISO Sleep Patterns
Producing highly accurate reports without individual customization is a consistent design flaw of many cyber security solutions. CISOs might sleep better at night knowing not only what’s specifically…
RSAC2020: IoT Is Officially Part Of Enterprise Mobility
Risk that comes from mobile and IoT devices must be factored into the enterprise security program. Security leaders need to be looking at those risks holistically and strategically, rather than operat…
Incident Of The Week: Carnival Cruise Lines Hit By Cyber-Attack
A Carnival cruise ship was subject to a cyber-attack in May of 2019. Though several months have passed, the effects are still lingering. This Incident Of The Week looks at how the cruise line responde…
Cyber Security Is A Team Sport
A Cyber Security Hub webinar with Code42 explored how cyber security can become an integral part of enterprise behavior and culture. The talk covered topics from the barriers to getting department coo…
Is The Enterprise Security Operations Center Effective?
The SOC is critical to today’s digitized economy and business requirements for operations both online and in the cloud. However, the current methods for security operations are not satisfying cyber pr…
Malware Analysis Strives To Outpace Enterprise Digitalization
Malware analysis is an essential element for developing the efficient removal tools that can ultimately eliminate malware from an infected system. The adoption of BYOD mobile devices and introduction…