Shifting the burden: Long-term magnifying consequences

Computer geeks love their acronyms. Here’s one more: TANSTAAFL. There ain’t no such thing as a free lunch. No, I’m not talking about the grilled Alaskan salmon meal you got while playing on your phone instead of listening to the vendor pitch. I m… Continue reading Shifting the burden: Long-term magnifying consequences

How to make the CFO your best cybersecurity friend

I’m bad dinner company. As the CFO of a cloud technology provider, I like to speak about finance and cybersecurity, two topics entirely capable of putting my dinner guests to sleep. However, both topics are extremely important in today’s business world… Continue reading How to make the CFO your best cybersecurity friend

Key obstacles in enterprise security budgeting

IANS released its latest findings on budget-related best practices for information security leaders to consistently command the budget and resources they need. “It’s part of the CISO’s job to transition from unsupported to being fully supported, but th… Continue reading Key obstacles in enterprise security budgeting

How to improve your security infrastructure when you’re on a budget

When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the latest technologies in place. You may not be able to solve all your security … Continue reading How to improve your security infrastructure when you’re on a budget

Poor communication between CEOs and technical officers leads to misalignment

A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating misalignment within the C-suite, which results in undue risk exposure and preven… Continue reading Poor communication between CEOs and technical officers leads to misalignment

Can you justify your security spend?

In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT operations and cybersecurity working together, as well as the AtomicEye RQ platform. Here’s a transcript of the podcast for your convenience. We’re going to spend some time today talking about cyber risk. Can you give us a brief introduction to yourself and your perspective on cyber … More Continue reading Can you justify your security spend?

How to implement an EFSS ransomware recovery plan

Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown exponentially in 2016, spanning large enterprises to small businesses, across industries. Enterprises are particularly at risk because the potential payoffs attackers receive are higher. Those hit with system-wide breaches impacting multiple users and thousands of files face hefty ransoms, anywhere from $200-800 per file. … More Continue reading How to implement an EFSS ransomware recovery plan

How cybersecurity mismanagement can destroy value

Cyber security remains a critical business challenge and a growing concern with a potentially devastating impact on company brands and bottom lines. Despite these damaging ramifications, many cybersecurity executives indicate that information protection may not be the strategic corporate imperative that it should be. In surveying 403 CIO, CISO, CTO and CIOs in the automotive, banking, technology and retail sectors, KPMG found that 81 percent of executives admitted their companies had been compromised by cyber-attacks … More Continue reading How cybersecurity mismanagement can destroy value

Manage cybersecurity risk by restoring defense-in-depth’s promise

Cybersecurity spending continues to soar, as the current, $75.4 billion worldwide market will increase to $101 billion by 2018, according to projections from Gartner. But how effectively are organizations investing in these tools? Not very, as 28 percent of the spending pays for security products which are either underutilized or not used at all, according to survey findings from Osterman Research. The investment doesn’t inspire much confidence among IT teams about the protected state of … More Continue reading Manage cybersecurity risk by restoring defense-in-depth’s promise

Industrialisation of cybercrime is disrupting digital enterprises

Only a fifth of IT decision makers in large multinational corporations are confident that their organisation is fully prepared against the threat of cybercriminals. The vast majority of companies feel constrained by regulation, available resources and a dependence on third parties when responding to attacks, according to new research from BT and KPMG. While 94 per cent of IT decision makers are aware that criminal entrepreneurs are blackmailing and bribing employees to gain access to … More Continue reading Industrialisation of cybercrime is disrupting digital enterprises