Arduous Search Yields Security Best Practices
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to…
Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to…
Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers…
Summit Keynote Speaker Dr. Shima Keene presented The Nexus of Cybersecurity, Crime and Terrorism. She is a Director of the Conflict Studies Research Centre, Oxford, UK, and is affiliated…
Kevin Thompson, Threat Analyst for FireEye, earlier worked as a cyber analyst for the CIA, covering Eastern Europe and Russia and briefing numerous government agencies on future potential incidents. His…
Truman Center Policy Program Manager Dan Paltiel, a keynote speaker at Cyber Security Summit 2016, spoke on the current state of cyber defense in Cyber After 2016: Protecting Your Network…
Senior Product Manager Bob Stasio of IBM i2 Safer Planet was keynote speaker for Cyber Security Summit 2016. Prior to joining IBM, Mr. Stasio worked in threat intelligence programs at…
Lt. Gen. (ret) Ronald Lee Burgess, Jr., who served as the 17th Director of the Defense Intelligence Agency, was one of the keynote speakers at Cyber Security Summit 2016 in…
“Minnesota is adding tech jobs at the greatest rate of anywhere in the country,” declared Suzanne Spaulding, Under Secretary for the National Protection and Programs Directorate (NPPD) at the…
In July, Verizon announced that it would acquire Yahoo’s Internet business for $4.8 billion. In September, Yahoo disclosed that a massive data breach had compromised 500 million user accounts. The breach…
Amid mushrooming IoT device sales and attendant channel transaction growth, findings from a recent study raise serious concerns about just how effectively online businesses are able to safeguard their stakeholders’…
Once they have breached a system, most hackers no longer need malware, according to a new study by LightCyber, a provider of Behavioral Attack Detection solutions. According to the company's…
According to the CEO of Stealthcare, a Cleveland-based cyber security firm, the next major cyber security attack will likely be tied to the GOP Convention, although he believes it won’t…
While cyber insurance policies are popular, and can be an effective risk-mitigation tool, we have advised clients to be cautious, to evaluate policy language carefully, and to anticipate coverage disputes.…
Based on the prevalence of the scam, some security experts have called 2016 “the year of ransomware,” yet a new survey shows most businesses don’t budget extra funds to regain…
Is your company exposed to significant cyber risk? If not, you're in the minority, according to a new report from RSA. For the second year in a row, RSA, The…