For those of you wondering what I brought back from RSA – other than more tote bags than I know what to do with – I actually returned with a strong idea of what was most, and least, interesting there. And the single trend that dominated them all.
Cyber intelligence is one of the strongest tools that can be used to combat a potential attacker. Accessing the information needed to build cyber intelligence from a reliable source is typically difficult and very expensive – but it doesn’t have to be. You can create your own...
On March 1st, new cyber-security regulations (23 NYCRR 500) for Financial Services companies went into effect in New York State. The regulations enforce certain minimum cyber-security standards for financial services companies, following the growing cyber threats that...
“Ransomware” – it’s been screaming from headlines around the globe in the last 24 hours – almost a hundred nations attacked, the British health system paralyzed, likely billions in damages, and an already weary world had its sense of security shaken, yet again.
Predicting cyber-attacks has long been an elusive goal in the cyber-security industry. Methods such as Lockheed Martin’s Cyber Kill Chain evangelized the idea that staying one step ahead of your adversary is the way to defeat advanced, persistent threats. Key components to...
From Siri to Alexa to Watson, we are living in an AI world; it understands when we ask it to play our favorite song; it knows what book we will want to read next. AI can recognize the face of an individual, and the distinctive look of a cancer cell. It understands concepts...
RSAC 2017 – with its grand mix of speakers, exhibitors, and presentations – was a whirlwind of security news and innovation. While last year’s conference highlighted point products and tools centering around deception and end-point anti-malware, this year’s buzz tended...