How Shared Infrastructure and Separation of Duties Better Optimize Endpoint Security

By: March 13, 2015
infrastructure

In my most recent post, I talked about the perils of hyper-optimization. I wrote in general terms, saying that hyper-optimization can result in a loss of agility. In today’s post, I want to share with you some specific examples I’ve… Read More

CryptoWall Proves Two Old Wrongs Can Work Right

By: March 12, 2015
wall

CryptoWall, an advanced version of the file-encrypting ransomware CryptoLocker, recently was sent to email accounts in at least seven countries. CryptoWall’s payload encrypts files on an infected computer in an effort to extort money in return for the decryption key…. Read More

Orchestration and Analytics are the New Infosec Buzzwords

By: March 11, 2015
analytics

(Editor’s Note: this article originally appeared as a contributed piece on infosecurity-magazine.com) As cyber security gets hotter (or maybe more and more depressing, depending on how you look at it), new buzzwords come to dominate our discussions. We’re all sick… Read More

Point-of-Sale Security for Dummies: Current Limitations in POS Protection

By: March 9, 2015
pointofsaledummies

(Today, in part four of our Point-of-Sale Security for Dummies blog series, we take a look at current limitations that exist in point-of-sale security systems. In part three, last week, we looked at advanced attacks and attackers’ motivation. In part… Read More

Information Security: The Final Frontier

By: March 6, 2015
enterprise

Have you ever watched Star Trek? Remember how the Enterprise would take heavy damage and Kirk would call down to Scotty for a repair estimate, and the chief engineer would say: “I just don’t know, Cap’n! I just don’t know!”… Read More

As Healthcare Takes Center Stage in Security, Hunting Exploits Trumps Liability Discussions

By: March 5, 2015
medrec

Healthcare records are highly sought after because they contain a treasure trove of information that cyber criminals can use for nefarious purposes. The healthcare industry has been feeling the pinch of security threats for quite some time, but with the… Read More