Big data is not only getting big, it’s also getting very expensive. Most SIEM vendors charge customers by the volume of data they handle. This means not only that companies usually end up spending more on protecting their networks than they originally planned, but also that...
"Intent." Is there anything more essential to business decision-making and processes?
The huge challenge presented by today’s attack campaigns – multi-stage attacks, with thousands of constantly evolving attack vectors – have led organizations to buy hundreds of security products in order to defend their networks. As exciting new technologies arise – advanced...
The EDUCAUSE Annual Conference is underway in Denver, and it has already fulfilled its promise to gather academic professionals and technology providers from around the world to discuss the hottest IT issues in higher ed. Cyber security is emerging as a strong conference...
For those of you wondering what I brought back from RSA – other than more tote bags than I know what to do with – I actually returned with a strong idea of what was most, and least, interesting there. And the single trend that dominated them all.
Cyber intelligence is one of the strongest tools that can be used to combat a potential attacker. Accessing the information needed to build cyber intelligence from a reliable source is typically difficult and very expensive – but it doesn’t have to be. You can create your own...
On March 1st, new cyber-security regulations (23 NYCRR 500) for Financial Services companies went into effect in New York State. The regulations enforce certain minimum cyber-security standards for financial services companies, following the growing cyber threats that...
“Ransomware” – it’s been screaming from headlines around the globe in the last 24 hours – almost a hundred nations attacked, the British health system paralyzed, likely billions in damages, and an already weary world had its sense of security shaken, yet again.
Predicting cyber-attacks has long been an elusive goal in the cyber-security industry. Methods such as Lockheed Martin’s Cyber Kill Chain evangelized the idea that staying one step ahead of your adversary is the way to defeat advanced, persistent threats. Key components to...
From Siri to Alexa to Watson, we are living in an AI world; it understands when we ask it to play our favorite song; it knows what book we will want to read next. AI can recognize the face of an individual, and the distinctive look of a cancer cell. It understands concepts...