Think Automation and AI Will Help Close Your Cybersecurity Skills Gap?

Do you think automation and AI/machine learning will help your organization close its internal skills gap? A recent study from the Ponemon Institute found otherwise — at least for now. According to the Ponemon Institute study (funded by secu… Continue reading Think Automation and AI Will Help Close Your Cybersecurity Skills Gap?

Delta, Sears Customer Data Breach Exposes Risks of Third Party Providers Once Again

Once again, a third-party vendor may have exposed sensitive credit card information of hundreds of thousands of Delta Air Lines and Sears. The attack shows the vulnerability to reputation and risk from attacks on third party vendors.
The post Delt… Continue reading Delta, Sears Customer Data Breach Exposes Risks of Third Party Providers Once Again

Machine Learning is Also a Tool for Cybercriminals

It doesn’t matter what discipline within cybersecurity one looks at, nearly everywhere one looks machine learning and artificial intelligence are changing how security data are analyzed, security tools deployed, and threats identified. I kno… Continue reading Machine Learning is Also a Tool for Cybercriminals

Annual Report Shows Increased Maturity in Security Operations

An annual study from enterprise software company Micro Focus has shown progress in the security maturity of organizations, but much more work remains. According to the fifth annual State of Security Operations Report 2018, there has been a 10 perc… Continue reading Annual Report Shows Increased Maturity in Security Operations

Students to Demonstrate Cybersecurity Skills in Annual Hacker Contest

Over the past few years, considerable attention has been given to the cybersecurity skills gap. In the post Enterprises Continue to Grapple with a Huge Cyber Security Skills Shortage we covered how the global cyber security workforce shortage is o… Continue reading Students to Demonstrate Cybersecurity Skills in Annual Hacker Contest

Changes to Data Breach Notifications in the Air

Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and … Continue reading Changes to Data Breach Notifications in the Air

The Five Attributes Needed to Succeed at DevSecOps

It’s hard to believe but the conversation around how security fits in DevOps has been going on for years. It was in 2012 when Gartner analyst Neil MacDonald wrote his blog DevOps Needs to Become DevOpsSec. In this blog MacDonald wrote &#8220… Continue reading The Five Attributes Needed to Succeed at DevSecOps

Nearly half of organizations cite employees as biggest risk

The more things change, the more they stay the same. While the nature of the technology employees use has dramatically changed over recent decades – from immovable desktops connecting to internal networks to iPads and netbooks with the abili… Continue reading Nearly half of organizations cite employees as biggest risk