Ignorance is no excuse — unless the folks approving your budget are unaware of the cyber threats that could cripple the business. These are the same threats that could be avoided and/or mitigated with help from the budget that you probably aren’t getting. It’s not scare tactics, it’s reality. Posted on theHRDirector.com. Emphasis in red added by me. Brian Wood, …
Planning to Fail? Just Say No to DIY DDoS Response
Companies that attempt to handle all of their IT infrastructure needs in-house may be doing themselves a disservice — especially when it comes to being on the receiving end of DDoS attacks. Lack of preparation and experience are two key contributing factors in the large amount of time it takes for companies to recover from a DDoS. Most don’t know …
Infographic: DNS Attacks On the Rise
From a summary article by Fred Donovan in FierceITSecurity. —— Attacks against the domain name system are on the rise, with a 200 percent rise in DNS attacks in the last year, according to data from Prolexic. A few months ago, there was a rash of DNS hijacking attacks against customers of Network Solutions by a pro-Palestinian group, which redirected …
Infographic: What Happens After the Intrusion
I picked up the ThreatMetrix infographic below in a summary article by Fred Donovan in FierceITSecurity. It’s not rocket science — it’s just crime. http://www.fierceitsecurity.com/story/infographic-what-happens-after-data-breach-occurs/2013-12-10
What the NIST Cybersecurity Framework Means to You
Read and heed. By Ernie Hayden in Industrial Safety and Security Source (and an excerpt from the Practical SCADA Security blog at Tofino Security). Emphasis in red added by me. Brian Wood, VP Marketing ——— NIST Cybersecurity Framework: What it Means You may have heard some buzz in the press about the release of the Cybersecurity Framework Draft from the …
Cloud Computing: Same As It Ever Was?
When the tide is high we cannot see the rocks lurking below the surface. When the tide is low, all is exposed. Either way, the rocks are always there. The wise captain uses all the tools available to avoid calamity regardless of the state of the tide: charts, depth-finders, sonar, even lookouts. Are YOU doing all you can do? Article …
CyberSecurity Salary Trends
Responsibility has its privileges — like higher pay. Higher risk, higher reward. Article by Chris Burt in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing ——— New Study Details Cybersecurity Salary Trends for 2013 Fifty-percent of Chief Information Security Officers earn an average annual base salary equivalent to that of other C-level executives, according to a …
Lessons Learned from 4 Big Data Breaches
Reading about the specific ramifications of high-profile security breaches is a good way to remind oneself that the cost of prevention is always less than the cost of cleanup. Sobering stuff. By Ericka Chickowski in Dark Reading. Emphasis in red added by me. Brian Wood, VP Marketing ———- Lessons Learned From 4 Major Data Breaches In 2013 In many respects …
Hubris Precedes Regret (and Security Breaches)
Just when you think you’ve got it all figured out — BAM! Intrusion. Malware. Data leak. Data loss. DARN IT! When will we silly people ever learn what Andy Grove taught us? “Only the Paranoid Survive” First article posted on Help Net Security and the second one is by Antone Gonsalves in CSO. Emphasis in red added by me. Brian …
Ready, Fire, Aim! Enterprise IT Security
“I’ll document that later.” “I’ll be sure to close that port when I’m done.” “The CEO wanted to start using his new device right away.” OOOPS! By Fred Donovan, FierceITSecurity. Emphasis in red added by me. Brian Wood, VP Marketing ——– Cloud security being left out of enterprise security policy, PwC survey finds Only 18 percent of enterprises include cloud …