We must challenge the conventional wisdom of security: every new threat vector requires a new solution. That you must keep adding new tools, new methodologies — and more people — to protect users, devices, apps, and networks.
A Look Back at the Major Cyber Threats of 2019
Use the latest Cisco cybersecurity report to understand the current cyber threat landscape, and test how your organization would perform against these attacks.
Cloud Unfiltered Podcast, Ep 22: Security Matters, with Bryan Doerr
You are officially forgiven if data breach headlines don’t surprise you anymore. I mean honestly, can there be anything scarier than a hacker having access to all the data we each have stored with Equifax? Equifax?! They’ve got my SSN, my address, my driver’s license, and all my credit card numbers. They know where I’ve […]
Incident Response Fundamentals – Communication
While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I...
Keeping up with Cybersecurity Threats in the Digital Age
Retailers are embracing and adapting to digital innovations to keep pace with rapidly-evolving customer demands. Online and mobile purchases continue to increase exponentially. According to Deloitte, 58% of consumers have used their mobile device to browse an online shopping website or app. In fact, double-digit growth of e-commerce is expected globally until 2020, as retailers […]
The Need To Solve for Time
Ponemon Institute called 2014 the year of the “Mega Breaches,” which will be remembered for its series of mega security breaches and attacks. These “Mega Breaches” are perfect examples of what is commonly known as Advanced Persistent Threats (APTs). The Ponemon Institute survey asked, among many questions, “When was the breach discovered?” Surprisingly, the results […]
Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center
Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats. There was a common theme among all […]
Naughty Users! Protect Your Endpoints From Users’ Bad Behavior
Every organization needs to face the fact that breaches can and do happen. Hackers have the resources, the expertise, and the persistence to infiltrate any organization, and there is no such thing as a 100 percent effective, silver-bullet detection technology. As security professionals, we tend to focus on what we can do to defend directly […]
Cybersecurity: Where are the Biggest Threats?
Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.