AIS in Daily Transcript Article re: Cybersecurity

Brian Wood Blog

From the May 21, 2013 Daily Transcript and based on a recent Executive Roundtable… Business cyberthreats require continuous security updates The cloud has defeated the “blue screen of death,” but companies are constantly taxed with updating security software and finding new ways to combat cyberthreats. A group of technology professionals discussed the threats they face and how they avoid them …

Sloppy Software: Serious Security Situation

Brian Wood Blog

You’d think we’d learn — that the feedback loop of “ouch, that hurts, not gonna do that again” would be in full effect. Well, uh, it seems that not everyone got the memo. (By the way, try searching for a “sloppy” image and see just how many photo variations of a certain type of edible dish come up — so …

IT Security: Do As IT Say, Not as IT Do

Brian Wood Blog

No matter how sophisticated the technology, the proverbial “man in the middle” is still often the weakest link when it comes to security. Below are sobering points about the importance of remembering the fundamentals: wash your hands, say you’re sorry, and change your password. By Caron Carlson in FierceCIO and original article by Nathan Eddy in eWeek. Emphasis in red …

China Painted Red re: Cyber Espionage

Brian Wood Blog

Yesterday I posted a blog about Verizon’s recent analysis of cyber security events in 2012, including cyber espionage. In that article China came out “in the red” (har har). Other information by Akamai, summarized below in an article by Charlie Osborne in ZDNet, paints a similar story, but not quite as dire. According to Akamai, China is still #1 with …

Verizon Report on Cybersecurity & Cyberespionage

Brian Wood Blog

Below is a very interesting article about a comprehensive investigation spearheaded by Verizon regarding cyber security, including cyber espionage and cyber criminal activity. Key callouts: Over 95% of cyberespionage attacks originated from China. Even split between size of organizations being targeted (small and large). In 4 out of 5 breaches, the attackers stole valid credentials to gain network access. The …

David Linthicum on Cloud Security

Brian Wood Blog

David Linthicum is a well-regarded thought leader in the cloud computing arena. His post below from GigaOm Pro address the “cloud security” issue straight-on — and clearly outlines the data and rationale for why public cloud services are often MORE SECURE than enterprise networks. Emphasis in red added by me. Brian Wood, VP Marketing ———- Security: Getting to the truth …

Cybersecurity Market Growth: 18% CAGR

Brian Wood Blog

Good news! The cybersecurity market is growing at 18% CAGR. Bad news! The reason the market is growing so fast is due to the growing pace of DDoS attacks, spam, malware, botnets, and so on. Read the summary article below by Justin Lee in The WHIR. Emphasis in red added by me. Brian Wood, VP Marketing ———— Global Market for …

Where Should IT Security Resources Be Deployed?

Brian Wood Blog

Ask a bunch of IT folks where security resources should be deployed — on networks or on servers. What do they think? Read below. Summary by Caron Carlson in FierceCIO, original article by Jon Oltsik in Network World. Emphasis in red added by me. Brian Wood, VP Marketing ——————– Security pros focus on networks over servers When it comes to …

DDoS Protection for the Cloud

Brian Wood Blog

The contributed piece below — published in DatacenterDynamics from Darren Anstee of Arbor Networks — is relevant to AIS and our customers. Rest assured, we have MULTIPLE layers of security in place for DDoS and many other types of threats. Please feel free to contact us if you would like to know more. Emphasis in red added by me. Brian …

Who’s Got Your Sensitive Data? And Who Else, Too?

Brian Wood Blog

Outsourcing is NOT a “fire and forget” endeavor. Far from it. “Trust but verify” is the recommended mantra — both before selecting a vendor as well as during the lifetime of the engagement, too. Always remember: vendors are NOT all the same. Compliance counts. Training matters. Experience yields effectiveness. And none of this comes for free. Summary post by Jim …