Accusations of Democratic People’s Republic of Korea’s (DPRK) involvement in the Sony Pictures leak are falling upon receptive ears despite a lack of solid evidence. After all, the attacks do bear some resemblance to those previously used to attack South … Continue reading
Category Archives: Information Security
Recently, as reported in the Wall Street Journal and also in Investor’s Business daily, as well as Fox News, President Obama is proposing that organizations share information security data as well as proposing laws to require companies to report breaches … Continue reading
It is a pleasure to introduce our guest contributor, Avi Deitcher, founder, consultant, and blog editor at Atomic, Inc. (http://www.atomicinc.com). Avi’s article below provides us timely and relevant insight as the workforce continues to evolve and employ technology focused on … Continue reading
On the front page of today’s IBD, there was a very timely article which should be a call to action to any business, and particularly small business. The article, “2015 Cyberattack Threats Lurk For Stock Exchanges, Law Firms,” raises several … Continue reading
Besides the sheer extent of the harm, the news coverage of the Sony pictures hack has presented two very different points of view on the origin of the hack and the actors involved. The FBI has held the view that … Continue reading
Over the years, any hiring manager has a core repertoire of key questions asked when interviewing candidates. One of my favorites, when interviewing security engineers and analysts, is to ask about what kinds of threats we need to defend against. … Continue reading
Yesterday, I went to give blood. With the holiday season approaching, it seemed like a good thing to do, plus for entirely selfish reasons, I wanted the sponsoring organization to stop ringing my phone morning, noon, and night. When I … Continue reading
Implementing a SIEM solution is an excellent decision for any business, no matter how small or large. While larger enterprises have the funds and staff to implement an in-house solution, such options are out of reach for many small businesses.
Most small to midsize businesses lack the resources and skills to manage an internal information security program, as well as the related technology to protect the business’ assets. While the management of the program and technologies may be outsourced, governance … Continue reading
The Internet and connected devices are essential tools for any small business, and it is difficult to impossible in this day and age to conduct business without the Internet. Yet, any business also needs to be mindful of the risks … Continue reading