Information Security: The Final Frontier

By: March 6, 2015

Have you ever watched Star Trek? Remember how the Enterprise would take heavy damage and Kirk would call down to Scotty for a repair estimate, and the chief engineer would say: “I just don’t know, Cap’n! I just don’t know!”… Read More

As Healthcare Takes Center Stage in Security, Hunting Exploits Trumps Liability Discussions

By: March 5, 2015

Healthcare records are highly sought after because they contain a treasure trove of information that cyber criminals can use for nefarious purposes. The healthcare industry has been feeling the pinch of security threats for quite some time, but with the… Read More

CTO Corner: A “FREAK” Accident or Totally Foreseeable?

By: March 4, 2015

Researchers have discovered a security hole impacting millions of web sites and web servers. Like the recent Heartbleed, Shellshock and POODLE vulnerabilities, this is another flaw that impacts core components of what make up the modern Internet. There are a… Read More

4 Areas of Disconnect in Information Security That Need to Be Addressed

By: March 4, 2015

Information security is in the early stages of a tectonic shift. As a result, there are several “disconnects” developing that organizations should take into consideration while crafting a modern security posture. Below are four key areas of disconnect I currently… Read More

5 Ways We Can Address the Talent Shortage in Cyber Security

By: March 3, 2015

One of the biggest problems in cyber security is that there are not enough qualified experts to manage the volume of attacks, alerts, audits, incident response drills, infrastructure upgrades, and compliance reports. And that’s not even getting into threat hunting… Read More

In Security, We Need More ‘Steerage-Class Heroes’

By: February 27, 2015

Part 1: Cyber Security is now a “Sinking Ship” Part 2: In a Sea of APT “Icebergs,” Are You Thinking Big Enough? Part 3: As the ‘Ship’ Sinks, What Are Your Priorities? Has all the recent talk about icebergs and… Read More