Closing the Confidence Gap
On our first Facebook Live Isabella shared that men feel they only need 50% of the skills to apply for a job, whereas women feel they need 80-90% -- in this post she encourages women to feel empowered to apply for tech roles.
GDPR: Start Your Privacy Protection Planning Now
One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from 25th May 2018. […]
Don’t Risk IT: Cybersecurity Risk Driving IT Modernization
Many federal, state, and local government agencies are operating old, outdated and end-of-life network equipment. You may think this just means slower, less efficient operation – not worth the cost to refresh your infrastructure, right? Wrong. Outdated network equipment is actually a major cybersecurity risk, particularly for government agencies, as it makes networks more susceptible […]
The Evolution of Scoring Security Vulnerabilities
The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assess and score security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed some of the challenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vulnerability and identifies the privileges […]
Cisco Security Workshop at OilComm 2015
Get the edge and agility to innovate, compete, and win with Cisco’s digital solutions for oil and gas. Connect machines, assets, and people across your business with proven architectures and technologies. Secure it all from board room to field worker to remote, unmanned site. Ever wondered about how to tackle the security risks the Oil […]
Cisco 2014 Midyear Security Report: Security Services and Risk Management
More organizations are starting to view cybersecurity as a strategic risk. They have to—it’s becoming unavoidable. Technology and the business are so intertwined. Regulators are issuing more compliance measures that include information security directives. And all the while, adversaries are relentless in their campaigns to compromise defenses to steal information, money, or otherwise create disruption.
Cyber Threat Management from the Boardroom Risk: Lost in Translation
I was at the Gartner Security and Risk Management Summit at the Gaylord National Harbor and had the opportunity to attend the session, “Finding the Sweet Spot to Balance Cyber Risk,” which Tammie Leith was facilitating. During the session, the panel had been discussing how the senior leadership teams address the problem of putting their […]
Beyond Data Security…Five Biggest Risks of Shadow Cloud IT Services
About two years ago, I went into a customer workshop on private cloud. As we were introducing ourselves around the table, the CIO turned to me with a pained expression and said, “Bob I have a different problem. My CFO and CEO just asked me if I knew how many of our users were accessing […]