Bruce Schneier: Government Needs to be Part of the Cybersecurity Solution

“Everything today is a computer,” declared Cyber Security Summit 2018 keynoter Bruce Schneier, CTO, IBM Resilient. IoT is the “computerization” of the whole world, making exponentially complex the safeguarding of most of our devices. Schneier, author of many security-related books and the popular Schneier on Security blog, presented “Click Here to Kill Everybody,” the name […]

Read more

Email Continues to Account for 90% of Phishing Attacks

Based on their behavior, cyber attackers seem to agree that old, proven tools are hard to beat. Email remains a cost-effective go-to tool for launching a cyber assault, relying on a little help from the human element. Brandon Reid, Enterprise Sales Manager at Mimecast, an email security company, presented Anatomy of an Email-Borne Attack at […]

Read more

Top 10 Items to Protect Security Systems from Cyber Attack

David Tyson, the CEO of CISO Insights, spoke to attendees of Cyber Security Summit 2018 about the top measures to take to protect security systems from cyber attacks. He began by visiting old challenges related to patches, viruses and denial of service attacks that persist as they have for the past 20 years. Out of […]

Read more

Cyber Security Summit Notes: Four Current Top-Line Policy Trends

Public policy trends drive what will happen with future cybersecurity regulation. Matthew Rhoades, Managing Director of the Cybersecurity and Technology Program at the Aspen Institute, reviewed four current top-line trends to attendees at Cyber Security Summit 2018. Rhoades’ list and comments: Data security and sensitivity is a driver in current discussions and legislation, domestically and […]

Read more
young professionals collaborating

Gen Z Might be the Answer to the Cybersecurity Workforce Shortage

Just as we think we are starting to get a handle on Millennials in the workforce, a new generation is changing the game. Enter Gen Z. The oldest members of Gen Z (those born after 1996) are hitting 21 and 22 years old and thus, entering the workforce. And the industry that is hungry to […]

Read more

Patient Safety Unites Rival Medtech Firms

Cybersecurity challenges are turning natural competitors into willing collaborators as companies try to ward off the shared threat of attack.  By Michael Border “Oops, your important files are encrypted,” a May 2017 pop-up advised on the screens of an estimated 200,000 computers worldwide. The culprit was WannaCry, a cryptoworm that attacked computers running the Windows […]

Read more

The California Consumer Privacy Act of 2018: It’s time for Businesses to Get Serious

California has just imposed a significant new set privacy and data security requirements that will impact a significant percentage of consumer-facing businesses in the US. Companies will have to implement new procedures as they collect, sell, and disclose consumer data, and they now have a statutory obligation “to implement and maintain reasonable security procedures and […]

Read more

Arduous Search Yields Security Best Practices

Tony Sager is a Senior VP and Chief Evangelist for the Center for Internet Security. He leads the development of the CIS Critical Security Controls, a worldwide consensus project to find and support technical best practices in cybersecurity. Tony also serves as the Director of the SANS Innovation Center, a subsidiary of The SANS Institute. […]

Read more

Target Cyber Security Chief Shares His Formula for Building a Loyal Team

Target Corp. experienced a serious system breach in 2013, introduced through an inadequately protected downstream supplier in what has become a textbook case of a hack to avoid. Tim Crothers had worked at General Electric Corp. He is the man who came aboard two years ago as Senior Director of Cybersecurity to steer the team […]

Read more

Teasing Out Data Jumble to Make Plots and Actors Emerge

Senior Product Manager Bob Stasio of IBM i2 Safer Planet was keynote speaker for Cyber Security Summit 2016. Prior to joining IBM, Mr. Stasio worked in threat intelligence programs at Bloomberg and global financial firms. He also has deep government experience having served at NSA’s Cyber Center, U.S. Cyber Command, U.S. Army’s Signals Intelligence Corps, […]

Read more

Cyber Due Diligence Should be a Key Component of a Corporate Acquisition

In July, Verizon announced that it would acquire Yahoo’s Internet business for $4.8 billion. In September, Yahoo disclosed that a massive data breach had compromised 500 million user accounts.  The breach happened nearly two years ago, in late 2014.  Now, Verizon has stated publicly that it believes the breach has had a material impact on Yahoo.  […]

Read more