Posts Tagged 'risk management'
Insiders have always and will always be a problem. The first step is to better understand the challenges and be able to effectively communicate with others. Many cybersecurity professionals are hesitant at addressing internal risks and feel much more comfortable at tackling external threats. This creates an imbalance, potentially to the detriment of the organization. […]
Sophisticated organizations defend themselves against cyber attacks with tools, products, services, and perhaps most importantly highly capable security professionals. But it is becoming very difficult to attract and retain good talent. The pool of qualified available resources has run dry and it is now up to the academic institutions to replenish the workforce population. It […]
Be afraid. Seriously. Ransomware is growing up fast, causing painful disruptions across the Internet, and it will get much worse in 2015. Ransomware is the criminal activity of taking hostage a victim’s important digital files and demanding a ransom payment to return access to the rightful owner. In most cases files are never removed, simply […]
Malware development continues to remain healthy. Intel Security Group’s McAfee Labs Threat Report: August 2015 shows malware’s quarterly growth at 12% for the second quarter of 2015. The overall count of known unique malware samples has reached a mesmerizing 433 million. Oddly, this confirms a very stable trend. For many years malware detection rates have […]
This is the third of three parts about root of trust and the Internet of Things. In Part 1 and Part 2, I covered how root of trust is an important approach to managing risk in virtualized network—especially compliance risks. The first two posts in this series examined several reasons to consider root-of-trust technologies. In […]