4 Areas of Disconnect in Information Security That Need to Be Addressed

By: March 4, 2015

Information security is in the early stages of a tectonic shift. As a result, there are several “disconnects” developing that organizations should take into consideration while crafting a modern security posture. Below are four key areas of disconnect I currently… Read More

5 Ways We Can Address the Talent Shortage in Cyber Security

By: March 3, 2015

One of the biggest problems in cyber security is that there are not enough qualified experts to manage the volume of attacks, alerts, audits, incident response drills, infrastructure upgrades, and compliance reports. And that’s not even getting into threat hunting… Read More

In Security, We Need More ‘Steerage-Class Heroes’

By: February 27, 2015

Part 1: Cyber Security is now a “Sinking Ship” Part 2: In a Sea of APT “Icebergs,” Are You Thinking Big Enough? Part 3: As the ‘Ship’ Sinks, What Are Your Priorities? Has all the recent talk about icebergs and… Read More

Recent Automobile Security Vulnerabilities Create ITSec Unrest

By: February 26, 2015

Recently, a second vulnerability was discovered in BMW’s ConnectedDrive system. The feature that was exploited was the ability to request a remote unlock of your car from your smartphone should you get locked out. However, the traffic to and from… Read More

Point-of-Sale Security for Dummies: Understanding Advanced Threats and Attacker Motivation

By: February 25, 2015

(Today, in part three of our Point-of-Sale Security for Dummies blog series, we take a look at advanced attacks and attackers’ motivation. In part one, we addressed the current state of POS security. In part two, we tackled 14 ways… Read More

Screenshot Demo: “Rewind the Tape” to Detect Ventir Dropper Malware on Mac OS X

By: February 24, 2015

Today’s screenshot demo is going to give you a quick glimpse into some of the visibility you get with Carbon Black on Mac OS X. This post touches on some key points to how quickly you can “rewind the tape”… Read More