CISO Insights

Back to Vendor Listings

The Army of Things

By now, you’re probably well aware of the fate recently befallen on the Brian Krebs site KrebsOnSecurity.com.  A Distributed Denial of Service (DDoS) attack in excess of 620/Gbps caused such a strain on one of the world’s largest DDoS protection services, that Krebs asked that his site fundamentally be black-holed until the storm passed. What…

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part Two

In this three-part series, Academic Healthcare CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world-class prevention program. Read part one. As a preamble to this list of key considerations and best practices, let me first say that all organizations should plan to be attacked.  While there may…

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part One

In this three-part series, Academic Health care CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world class prevention program. Ransomware has been the buzzword du jour for the past year in computer security.  This mostly unsophisticated attack type uses deception and already-existing means of communication to destroy…

Will Corporate Security Models Move Toward the EDU Security Model?

No network is impenetrable, a reality that business executives and security professionals alike must accept. The traditional perimeter focused approach to cybersecurity has often failed to prevent intrusions, especially in an application-focused paradigm. While prevention is crucial, timely incident detection of anomalous behaviors for data ex-filtration are key. Continuous monitoring assumes the attackers are already…