A Modest Proposal to Eliminate (or Modify) Breach Disclosure Laws

by Mark Rasch Google recently disclosed the fact that a vulnerability in its Google Plus configuration could have been used by hackers to expose personal information about users of the Google Plus service. (https://www.nytimes.com/2018/10/08/technology/google-plus-security-disclosure.html) Indeed, Google announced that it was shutting down the service as a result of the hack. That’s not what outraged the…

Details

Darren Death: Developing a business continuity plan – and sticking to it

It is standard business practice for organizations to have a contingency plan after acknowledging the various threats and risks that it faces. Having a plan in place, however, is not enough. The organization must periodically update the plan, test how well it works, communicate it to stakeholders, and ensure that people have the capability to…

Details

How to Get Everyone Attuned to Cybersecurity: Ways to Raise Security Awareness

Your organization’s security stance must be supported by everyone in the company, every day, in all that they do. However, people are focused on their jobs, not necessarily on security. With attacks increasingly starting at the human level through social media or targeted emails, your organization needs to create and maintain a high level of…

Details

People, Process and Technology: Tips for Strengthening the Three Pillars of a Highly Effective Security Program

Did you know you need just three resources to build a highly effective security program? It’s true. Your success will be highly contingent upon how you leverage people, process and technology. Perhaps it is the rule of three which make this all gel, but if you take proper care of these three elements, everything else…

Details

Healthcare Ransomware Attacks – Don’t Be Part of the Statistics

In 2017, six of the top ten HIPAA breaches reported to the U.S. Department of Health and Human Services (HHS) stemmed from ransomware.[1] In a typical ransomware attack, important data is encrypted and “held for ransom” until the victim pays a designated amount in exchange for gaining access to the keys to decrypt the data…

Details

Using Metrics to Improve Your Security Program

So…you are responsible for the computer security of your organization. You probably have many great ideas on how to do this. You start looking around for products and services to implement those plans of yours and figure out quickly there are no commercial solutions that fit into your budget. Now what do you do? Enter…

Details

Four Ways to Improve the Security of Blockchain

Blockchain has the potential to be one of the most disruptive technologies since the invention of the Internet. There is an entire class of problems with distributed reconciliation of data entries that this can potentially solve. The creators of Blockchain saw past its initial usage for cryptocurrency implementation toward a future where many distributed applications…

Details

McAfee Acquisition of Skyhigh Networks Confirms CASB Market Predictions

As business functions move to the cloud, it’s imperative to retain visibility into who is connecting to cloud applications, what they are doing, and what devices they are using to connect. This is where Cloud Access Security Brokers (CASBs) come into play. CASB solutions help manage risk by providing the visibility, and in some cases,…

Details