September 24, 2017

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention.  

Acronyms a...

September 21, 2017

Small businesses aren't immune to cyber attacks. In fact, they may be more vulnerable and at risk than their larger counterparts who have the deep pockets needed to protect themselves and to weather the storm of an incident.

August 27, 2017

A few weeks ago, I was lucky enough to meet with some senior in-house counsel from a Fortune 10 company. We were discussing data and the powerful ways analytics can be used in litigation. One of the attorneys appeared somewhat dismayed, saying that while analytics are...

August 27, 2017

I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all about risk management. Many of you are likely working with your company’s chief information security officer (CISO) and security teams...

August 27, 2017

It’s Friday afternoon and the conversation goes a little like this, “Wait, what?  They’re leaving?  Where are they going?  Is there any opportunity to help them reconsider?” 

When a key employee departs an organization, it can take a toll on clients and c...

August 27, 2017

The Cloud is everywhere we turn these days.  If you haven’t seen or read an article in the last year about what it is, why you should move to it, why you shouldn’t move to it, how everyone else is moving to it, or other key, critical advice about it, then you haven’t b...

August 27, 2017

Ransomware.  Just the word itself is enough to chill the hearts of everyone from personal users to corporate IT and senior executives. May 12th’s massive attack took down hundreds, perhaps thousands, of companies and unknown numbers of individuals, including the United...

Please reload

Featured Posts

The Ethical Hacker: Technically Speaking, Cybersecurity