Updates, Patches and Hackers Oh My!
Updates, Patches and Hackers Oh My!Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time - patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network system...
Cyber War isn’t Coming It is already Here!
Cyber War isn’t Coming It is already Here!Wars today are less likely to be kinetic, and it is safe to assume that the primary mode of retaliation from Iran will be a cyber attack. Iran wants to bring down the U.S., and the fastest way to do that is to damage us...
How Mature is Your Insider Threat Intelligence?
How Mature is Your Insider Threat Intelligence?Are insiders a threat to your business? How would you know? Today it is necessary for companies to establish a robust insider threat program that can detect employee-created risk and respond accordingly but keeping...
Zeroing In On our Industrial Control Systems
Zeroing In On our Industrial Control Systems The country of Iran has been recruiting and training an army of cyberhackers and developing digital tools that can disruptively sabatoge entire computer networks. Now they are focusing their efforts on SCADA systems often...
Metrics Can Not Adequately Describe The Pain of Cybercrime
Metrics Can Not Adequately Describe The Pain of Cybercrime How can you measure the effect of a cybersecurity incident on your company? Knowing the number of records involved and the costs incurred by the event, but it can not give you a complete picture because there...
Hackers Preying on Old and Decrepit Technology
Hackers Preying on Old and Decrepit TechnologyCybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older vulnerable...
Nebulous Budget and Security Concerns Affecting Cloudy Decisions
Nebulous Budget and Security Concerns Affecting Cloudy Decisions Everyone is talking about "the cloud," and many of the more prominent forecasting firms are saying that the revenue from this technology will exceed 350 billion in the next three years. However, I have...
Bomb’s will not be Iran’s retaliation – Technological hacks are more likely
Bomb's will not be Iran's retaliation - Technological hacks are more likelyMicrosoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and former United States...
Cloud Migration Considerations to Take into Account
Cloud Migration Considerations to Take into Account Deciding to move to business technology services to "the Cloud" is one of the most significant that is made by business leaders, and it is a decision best not made without the approval at the highest level of the...
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) Sensors
Soon Most New Cars May feature Light Detecting, and Ranging (LIDAR) SensorsIn an announcement on Thursday, the Tier 1 auto-parts maker Bosch is planning to use remote pulsed laser light sensors to measure distances, officially known as LIDAR. They are one of the few...