Category Archives: Cybersecurity

Like Humpty Dumpty’s fall from the wall, a major data breach can crack a government
Posted by

Like Humpty Dumpty’s fall from the wall, a major data breach can crack a government

When governments suffer data leaks, the traditional fallout of breaches are combined with political scandal – the impact is multiplied and scrutiny magnified. Questions are asked around why information was withheld or, if announced soon after discovery, why it took so long to uncover. Just as a business suffers reputation damage after a breach, the […]

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies
Posted by

No, There Won’t Be New Rules On Cybersecurity – Until Someone Dies

Recently, I did an interview with Bloomberg Newsweek on the WannaCry ransomware attack that affected over 200,000 computers around the world.  The attack shutdown parts of the U.K. National Health Service leaving thousands of people without access to healthcare services, and resulted in Renault’s assembly lines being shut down in France among other things.  Newsweek […]

Mitigating Cyberattacks: The Prevention and Handling
Posted by

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses but as companies adopt cloud services in greater numbers and refine internal processes for development and operations, security considerations must be front and center. As companies rapidly adopt Cloud with a DevOps approach to rapid […]

Ransomware Cyber-Attacks: Best Practices and Preventive Measures
Posted by

Ransomware Cyber-Attacks: Best Practices and Preventive Measures

RANSOMWARE CYBER-ATTACKS “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to unlock the data. The companies that were hit included Telefonica – Spain’s largest telecom provider, […]

Principles of an Effective Cybersecurity Strategy
Posted by

Principles of an Effective Cybersecurity Strategy

Managing Cybersecurity Risks A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party applications, self-provisioning as a result of bring-your-own-device and public cloud. Add to these, unprecedented levels […]

What Is Important? Cyber and Continuity Risk
Posted by

What Is Important? Cyber and Continuity Risk

New risks are emerging every day in the realm of Cybersecurity, and many organizations are moving quickly to address these risks: developing documentation, procedures, and processes. However, this is often without regard for Cybersecurity best practices. To ensure sustainability, organizations must develop cyber policies, plans, and procedures and put effective controls in place. If these […]

Promoting Data Security in the Workplace
Posted by

Promoting Data Security in the Workplace

No matter the workplace, data security is often a top concern for management professionals. Security breaches can end up threatening the livelihood of employees and entire companies alike, depending on how severe they are. There are solutions available to many common professional data security problems. However, understanding the surrounding statistics is often the first step. […]

Ensuring Resilient Cyber Safeguards in Cloud Applications
Posted by

Ensuring Resilient Cyber Safeguards in Cloud Applications

Assessing Cloud Application Vendors from a Security Perspective Enterprises of all structures and sizes across the globe have been adopting cloud for all needs – for computing, storage, databases, to hosting business applications. They are also proactively addressing cyber-security needs – both as dictated by internal Info-Sec controls, as well as those coming from external regulatory mandates. For enterprises […]

What Startups Can Do About Cyber Attacks
Posted by

What Startups Can Do About Cyber Attacks

A cybersecurity report by Ponemon Institute, in association with Keeper Security, found that in the 12 months leading up to June 2016, 55 percent of small and medium-sized businesses (SMBs) experienced a cyber attack, while 50 percent encountered data breaches involving customer and employee information. These statistics belie the common notion that cybercriminals attack only […]