Security » Opinions »

  • Why cyber hygiene isn't enough

    Organizations need to practice regular cyber hygiene for healthy outcomes. But they must also take steps to mitigate cyber risk—the most serious threats to our security.

    23 June 16 01:13 Written by Bryan Ware
  • Let the budget games begin!

    Even when top management is enlightened about the importance of good security practices, a security manager needs to go into the budget meeting prepared.

    09 June 16 00:11 Written by By Mathias Thurman
  • LinkedIn’s disturbing breach notice

    What is hard to understand is why LinkedIn didn’t feel the need to force password changes until four years after the breach.

    01 June 16 21:51 Written by Evan Schuman
  • The post-acquisition blues

    The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.

    28 April 16 23:32 Written by By Mathias Thurman
  • Even paradise needs backups

    Holiday travel is no time to drop your guard, especially if you take any electronic devices along.

    25 April 16 22:49 Written by By Kenneth van Wyk
  • When Locky strikes

    A friend’s company is hit with aggressive ransomware and calls our manager for advice.

    20 April 16 00:05 Written by By J.F. Rice
  • Let’s not make secure encryption illegal

    Restrictions are abhorrent and a draft bill in the Senate is overly broad and ambiguous. But if Congress insists on restrictions, let's add some critical limits.

    15 April 16 07:13 Written by Evan Schuman
  • Stop Passing Around Those Passwords!

    The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?

    30 March 16 23:02 Written by By Mathias Thurman
  • Surprise! You have mystery PCs

    Vulnerability scans uncover on the network unpatched, unprotected PCs that IT never even heard about.

    15 March 16 08:03 Written by By J.F. Rice
  • Surprising tips from a super-hacker

    Virtually everyone in technology knows about Kevin Mitnick, the one-time fugitive hacker who is now a security consultant. Mitnick has a wealth of security advice for the public.

    07 March 16 21:58 Written by Mike Elgan
  • Good security begins with the endpoint in mind

    In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement.

    04 March 16 06:53 Written by Robert C. Covington

Market Place