2014 MSR
You’re Only as Secure as Your Weakest Link: Operationalizing Security
2 min read
I am reminded of the wisdom of the old saw that “no news is good news” as almost every day brings us headline after headline highlighting that yet another company has experienced a systems breach and valuable data has been compromised. Companies continue to increase the amount of money spent on cyber security in an […]
Social Engineering: Finding the Weak Links In-Person
2 min read
An enterprise can pay hundreds of thousands of dollars or more for the latest security software and imagine itself protected from targeted attacks that come in via the network. But if the threat is a real-live person who walks in the front door of an office or server farm, what good can the network edge […]
The increasing prevalence and complexity of malware
2 min read
In recent months, many organizations are becoming more interested in the information security landscape and how these threats can affect their business today. In the recent Cisco 2014 Midyear Security Report, the results showed that 90% of select customer networks were found issuing DNS queries to domain names known to be associated with malware distribution. […]