The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command… Continue reading The Kill Chain Model Works When Analysts See the Full Picture

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three questions all organizations should be asking to understand their d… Continue reading Data Loss Prevention Needs a Little Help from Its Friends

Effective Cyber Security is All About the Benjamins

Who can forget the famous Jerry Maguire quote, “Show me the money!” Fans have referenced it for decades in various contexts for obvious reasons. Money drives decisions, ideas and actions. In enterprises, almost every major decision is driven by money, a.k.a ‘value at risk,’ except when it comes to cyber risk. Attempts thus far to quantify the financial impact of cyber risk have fallen short. The dynamic nature of threats, vulnerabilities, technologies and data coupled with understanding the actual impact of a breach at all levels – brand damage, data and dollars lost, reputational damage, etc. … Continue reading Effective Cyber Security is All About the Benjamins

Posted in SBN

What’s Old May be New Again to a Cyber Criminal

A few years ago, I met with the security leader of an enterprise who was in the middle of a compliance fire drill. During their Payment Card Industry Data Security Standard (PCI DSS) audit, a vulnerability scan uncovered an IP address in the environment that contained a critical vulnerability. However, the vulnerability management team had no idea on which server the IP address was hosted nor where that server was located. They scrambled for three weeks searching for it, only to discover the server was sitting in a server closet collecting dust. The server had payment card information on it, … Continue reading What’s Old May be New Again to a Cyber Criminal

Posted in SBN