Nehemiah Security Risk Quantifier 4.0: Modeling shared risks across business lines

Nehemiah Security recently released version 4.0 of Risk Quantifier (RQ) — our software platform to automate cyber risk quantification — which provides enhanced ability to quantify, communicate, and manage risk across an enterprise’s various lines… Continue reading Nehemiah Security Risk Quantifier 4.0: Modeling shared risks across business lines

GDPR: Today is the day

Today is the day many organizations around the world have been preparing for. As GDPR becomes enforceable, we sat down with Jerry Caponera, VP Cyber Risk Strategy, Nehemiah Security, to talk about this important regulation and its wide-ranging impact. … Continue reading GDPR: Today is the day

Cyber risk assessment and disclosure requirements: What’s important to you?

In this podcast recorded at RSA Conference 2018, Jerry Caponera, VP cyber risk strategy at Nehemiah Security, offers some interesting thoughts on cyber risk assessment and disclosure requirements. Here’s a transcript of the podcast for your convenience… Continue reading Cyber risk assessment and disclosure requirements: What’s important to you?

New infosec products of the week​: March 9, 2018

Discover, secure and govern personal data in motion StreamSets Data Protector reduces risk of violations by helping companies meet requirements for GDPR, HIPAA and other compliance regimes. It extends protection to the point of initial data ingestion, … Continue reading New infosec products of the week​: March 9, 2018

South Korea Winter Olympics: Cyber lessons from the past

There is little doubt that guns, gates, and guards will be on full alert in Pyeongchang, South Korea as the nation readies itself for the 2018 Winter Olympics, which begin Feb. 9. In concert with feats of strength, dazzling stadiums and piping national… Continue reading South Korea Winter Olympics: Cyber lessons from the past

As investigation against Assange is dropped, WikiLeaks releases new CIA malware

It’s Friday, which means that WikiLeaks is releasing another installment from Vault 7, the cache of CIA documents on cyberwarfare. This time it’s a tool that targets Microsoft Windows and a common version of Linux. This release comes the same day that Sweden announced it would drop its rape investigation into WikiLeaks founder Julian Assange. British authorities still have a warrant out for Assange’s arrest for failure to appear in court. The U.S. government has not said whether it will charge Assange in the releases of classified information. The newest WikiLeaks release is focused on classified CIA malware called Athena that targets all Windows operating systems including the latest offering, Windows 10. The dates of the leaked documents show that the CIA was able to hack Windows 10 only months after it was released. The malware also targets Ubuntu v. 14.04, the most popular version of Linux. The weapon was developed […]

The post As investigation against Assange is dropped, WikiLeaks releases new CIA malware appeared first on Cyberscoop.

Continue reading As investigation against Assange is dropped, WikiLeaks releases new CIA malware

Can you justify your security spend?

In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT operations and cybersecurity working together, as well as the AtomicEye RQ platform. Here’s a transcript of the podcast for your convenience. We’re going to spend some time today talking about cyber risk. Can you give us a brief introduction to yourself and your perspective on cyber … More Continue reading Can you justify your security spend?

New infosec products of the week​: March 3, 2017

Nehemiah Security’s AtomicEye RQ quantifies the effects of cyber exploits Nehemiah Security released AtomicEye RQ (Risk Quantifier). Engineered to replicate a network environment and mathematically predict the effects of real cyber exploits, AtomicEye RQ provides executives with visibility and investment accountability, and security operators with a detailed, up-to-the minute understanding of the vulnerabilities in their environment. This knowledge makes it easier to secure the network and invest intelligently in cyber defense tools. “Clients and CISOs … More Continue reading New infosec products of the week​: March 3, 2017