Beware the Cybersecurity Gold Rush

Beware the Cybersecurity Gold Rush

Fast forward to 2016 and we are in the middle of a gold rush in the cyber market.  The list of data breaches is overwhelming.  It’s estimated that cyber crime is overtaking traditional crime.  And vendors everywhere are offering cyber security products and services....
The Robbers Are Already in the Bank

The Robbers Are Already in the Bank

Over the long history of banks, many mechanisms have been used to thwart would-be thieves. For instance, a bank would protect the transport mechanism (stagecoaches, armored cars) and heavily secure the soft-points, like tellers and bank branches. The vault was the...
Your Vendor is Lying to You

Your Vendor is Lying to You

The Target breach illustrated just how important vetting third parties is. The hack was successful for a number of reasons (including Target’s failure to act on the attack much earlier, when it was detected), but the initial breach happened through a small vendorwhich...
Virtual CISO-as-a-Service comes of age

Virtual CISO-as-a-Service comes of age

vCISO, or Chief Information Security Officer (CISO)-as-a-Service, is a concept whose time has come CISOs are hard to come by and good ones even more so. InfoSec professionals in general are tough to find and especially ones that can fulfill all the duties of a...