Return on Security Investment: The Simple Formula [Part 1]

One can say that the real purpose of Information Security is to preserve value: the value of intellectual property, transactions, access to and dissemination of information, ...
Read More

Protecting Yourself from Petwrap or NotPetya or Petya

Watching news stories this morning on national media, it seems that the public feels somewhat helpless in how to defend themselves from the latest ransomware onslaught, ...
Read More

CIPHER ALERT - New Global Threat Petya or Petwrap

News of a new global ransomware attack began to emerge this morning (6-27-2017). Companies in Ukraine, Spain, the Netherlands, Denmark and the United Kingdom have already been ...
Read More

We Have Security Prevention Bias

One can say that there are three stages of information security operations: Prevention, Detection, and Response. Of the three, it is usually prevention that gets the most ...
Read More

ACDC Is ‘Stand Your Ground’ Cybersecurity Legislation

Representative Tom Graves (R-GA) released federal cybersecurity legislation in February 2017 (with updates in May) called the “Active Cyber Defense Certainty Act,” or ACDC. ...
Read More

After WannaCry: Practical Tips on How to Prevent Ransomware

Ransomware isn’t anything new, yet more than 3/4 of organizations targeted by ransomware attacks still do not have security in place that can prevent infection. What happens ...
Read More

Ransomware Attack Encrypts Data on All Windows Versions

This morning, a ransomware-type attack occurred on several companies in Europe. The systems at Telefónica's headquarters in Madrid appear to have been the initial targets of ...
Read More

Does your incident response process lead you in every direction?

Stop what you are doing. Pull out your written Incident Response Process or Plan (if you have one at all). Now, think about this. When is the last time it was physically ...
Read More