Who is responsible for IoT security? What about implied warranties? There are increasing concerns around the security of devices on the Internet of Things given the recent weaponization of many devices to launch DDOS attacks. The specific issues involved poor … Continue reading
Would you agree to sell your account password at home or at work? According to Investors Business Daily, 20% of you would based on a study by SailPoint which surveyed 1000 employees.
Just about every company involved in the cybersecurity industry is looking at artificial intelligence, (AI), as a means to win the war against cybercrime and address the human element which has been attributed to 70% of IT breaches. Many of … Continue reading
Headlines can be found on a daily basis reporting increased cybercrime. While larger businesses are better funded protecting themselves, the small business market is undeserved by the large security vendors. Worse, with the cyber security business bringing in billions in … Continue reading
Over $1.2 billion stolen by thieves using email scams in last two years according to the FBI. Financial fraud easily targets stolen email accounts with 50% of SPAM email containing malware. Smaller firms have less technical and security resources resulting … Continue reading
Reading this morning’s Wall Street Journal I had mixed feelings on the article “FTC Can Target Firms for Lax Security.” In many ways this is a positive step forward because it adds another compelling regulatory incentive to businesses encouraging them … Continue reading
Three Trillion Reasons – One Answer According to a recent McKinsey Report, by the year 2020, the total cost of ineffective security will reach $3 trillion dollars annually. That is a huge number and one fifth of the current US … Continue reading
Security frameworks generally agree that the primary activities organizations need to engage in with regards to information assets are to: Identify Assets Protect against events compromising confidentiality, integrity or availability Detect incidents Respond to actual incidents Recover