Encryption Requirements Driven by Data State

Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I noticed something that seemed a little off. It is commonplace for regulations to require measures be taken to protect data. Many r… Continue reading Encryption Requirements Driven by Data State

A Natural Law for Digital Data

Digital data provides the strength and vitality of the Information Age. Bits have as much, if not more, value than comparable assets in the physical world. Losing control of proprietary or critical information could have legal, financial or business r… Continue reading A Natural Law for Digital Data

Cybercriminals Increasingly Exploitating Pandemic Trauma

The ancient military strategist Sun-Tzu wrote that “in the midst of chaos, there is also opportunity.” He was referring to the ability to point your opponent toward the direction of your choosing. Cybercriminals have taken this philosophy to heart: Th… Continue reading Cybercriminals Increasingly Exploitating Pandemic Trauma

BootHole Shows Need for Greater Scrutiny

The recent BootHole and related vulnerabilities raise the question of whether software used for critical security functions should have special scrutiny. When a security operation fails the ramifications are considerable, especially when the security … Continue reading BootHole Shows Need for Greater Scrutiny

Cybersecurity Strategy, Risk Management and List Making

A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.

The post Cybersecurity Strategy, Risk Management and List Making appeared first on Security Intelligence.

Continue reading Cybersecurity Strategy, Risk Management and List Making

In Search of Equilibrium: Compliance and Security

When properly aligned with business goals, compliance and security work in concert as part of a holistic, integrated system.

The post In Search of Equilibrium: Compliance and Security appeared first on Security Intelligence.

Continue reading In Search of Equilibrium: Compliance and Security

Social Engineering and the Stranded Olympic Traveler

Visitors to the 2016 Summer Olympic Games in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam.

The post Social Engineering and the Stranded Olympic Traveler appeared first on Security Intelligence.

Continue reading Social Engineering and the Stranded Olympic Traveler

The Next Big Thing: Who Drives the Security Agenda?

Cybercriminals may be the ones setting the security agenda, but security professionals can collaborate to defeat malicious actors and improve defenses.

The post The Next Big Thing: Who Drives the Security Agenda? appeared first on Security Intelligence.

Continue reading The Next Big Thing: Who Drives the Security Agenda?