Hi, all – Last week I seized the opportunity of a lifetime – joining 5,000 influential women and men in business at the sold-out 2015 Lead On Watermark Silicon Valley Conference for Women. The event was a mix of people with different backgrounds, personalities, and leadership styles, but we were all brought together by our […]

Many organizations today are being led to believe that all they need for a secure network is a next generation firewall (NGFW) solution. As countless point-product firewall vendors try to position their product as a silver bullet for all security issues, top security analyst Jon Oltsik of Enterprise Strategy Group unveils the truth: today’s CISOs […]

Highly complex infrastructure systems require protection against cyberattacks. Electricity is so much a part of our everyday lives that we really only think about it when it is not there. That is why it is so important to build better security for our national electric power grid and other critical infrastructure. The power grid is […]

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]

Chapter 1: Preparing to Deploy Data Loss Prevention”  Deploying a data loss prevention (DLP) solution can be intimidating, but take heart—it’s not as daunting as you might think if you approach it step by step. In his four-chapter white paper, Implementing and Managing a Data Loss Prevention Solution, Rich Mogull, analyst and CEO of independent research […]