A Cyber Executive Order For the 21st Century

The long-expected Executive Order On Improving the Nation’s Cybersecurity was published Wednesday, May 12, 2021. My initial reaction is positive. It calls for using multifactor authentication and encryption within Federal agencies after all, things th… Continue reading A Cyber Executive Order For the 21st Century

How to Protect Structured and Unstructured Data

Every effective PII protection effort addresses three critical imperatives – data discovery, access governance and risk mitigation. IT teams grappling with privacy mandates need to consider these factors across their unstructured and structured data c… Continue reading How to Protect Structured and Unstructured Data

DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack

Colonial Pipeline might be tight-lipped about the vulnerability hackers exploited to launch a ransomware attack that shut down the U.S.’s largest pipeline, but details are emerging about the DarkSide ransomware variant behind the attack and the cyberc… Continue reading DarkSide Offered Ransomware-as-a-Service Before Pipeline Attack

SecurID’s enhancements accelerate cloud adoption and advance customers’ zero trust strategies

SecurID announced key enhancements that will help organizations accelerate their cloud journeys, provide full-spectrum authentication options, and ensure flexible and adaptive identity experiences for all users and use cases. Together, these innovation… Continue reading SecurID’s enhancements accelerate cloud adoption and advance customers’ zero trust strategies

Of Pipelines And Cybersecurity

One of the scariest phrases I have ever encountered is “gasoline pipeline” –thousands of miles of three foot diameter pipes buried in the ground for decades carrying billions of gallons of one of the most dangerous substances we encounter every day. R… Continue reading Of Pipelines And Cybersecurity

Protecting Collaboration Channels for Remote Work

As COVID-19 unfolded in the first half of 2020, many of us set out to explore its long-term ramifications and imagine what the ‘new normal’ could look like. We also wanted to understand the second- or third-order effects of remote working and accelera… Continue reading Protecting Collaboration Channels for Remote Work

The Security Industry is Protecting the Wrong Thing

When the security industry talks about a data breach, often the first question asked involves the state of the victim’s network security – not the breach of data. Why is this? It’s because organizations have their security priorities… Continue reading The Security Industry is Protecting the Wrong Thing

Enterprises in the Crosshairs of Nation-State Attacks

In a recently released report sponsored by HP, Nation States, Cyberconflict and the Web of Profit, Dr. Mike McGuire, senior lecturer in criminology at the University of Surrey, claims a 100% rise in nation-state cyberincidents between 2017 and 2020. F… Continue reading Enterprises in the Crosshairs of Nation-State Attacks