Save Yourself Money by Getting Ahead of Legal Requirements for Data Security
From a legal standpoint, businesses must do what is considered “reasonable” to secure their organization’s data. “Reasonableness” has been the standard for data security...
View ArticleOne Characteristic Every Security Professional Must Have
Every year, just before RSA, a story drops that everyone is buzzing about. This year, that story is about the guy who tweeted...
View ArticleEven if You Think You’re Avoiding the Cloud, You’re Probably Using It
At the 2015 RSA Conference in San Francisco, I asked random attendees about advice they had received about the cloud. Many cheekily responded,...
View ArticleOur Next Workforce May Require Continuous Authentication
The person who has signed onto the phone is not necessarily the person using the phone. If you’re a parent who has ever handed...
View ArticleFour Cloud Mistakes You Need to Avoid
At the 2015 Security B-Sides conference in San Francisco, I caught up with Dave Lewis (@gattaca), global security advocate for Akamai,...
View ArticleRSA Conference 2015: End of Show Report
Over this past week, I attended both the Security B-Sides conference and the RSA Conference in San Francisco. Armed with camera and microphone, I...
View ArticleAdopt the “G.I. Joe” Philosophy of Securing Rogue Devices
The perception that you only need to monitor traffic that’s happening on your network is extremely limiting, since customers are communicating “out of band”...
View ArticleUsing Marketing Techniques to Affect Behavioral Changes in Security
“When it came to information security awareness, we wanted to get much more of a visceral response from our people than we were getting up...
View ArticleCloud Computing Trade-Offs
“As a business or as an individual you have to make a choice. Should I do this thing—whatever it is—on my computer and on my...
View ArticleHow Well are Your Peers Dealing with Cyber Threats?
Tenable Network Security, the leading provider of vulnerability management and continuous network monitoring solutions, conducted a survey in April 2015 with renowned research company...
View ArticleBridging the Infosec/Business Communication Gap with Tenable’s Assurance...
Traditionally, business executives have been concerned with revenue, market share, competitive threats, expenses and economic indicators. Today, inundated with frequent headlines about high profile...
View ArticleCybersecurity Legislation Week 2015: The Aftermath
While virtually the entire security world was in San Francisco last week, our elected officials on the other coast held what they called Cyber...
View ArticleAuditing Open Ports with Nessus®
Every major breach starts with a reconnaissance effort, which usually involves a port scan. It’s therefore safe to assume that port scans are the...
View ArticleEndpoint Security with Nessus® Agents
Endpoints can include PCs, laptops, smartphones, tablets and specialized equipment such as bar code readers or point of sale (POS) terminals. For the purpose...
View ArticleThe State of Cybersecurity in the UK and Germany
64% of respondents had experienced an attack during the past yearBlue
View ArticleThe Security Model is Broken, Part 2: The Risk Assumption Process
Enterprises need a formal risk assumption model which clearly states who can assume security risksOrange
View Article