Return on Security Investment: Data Breach Example [Part 2]

In a previous blog post, we showed how Beckstrom’s Law could be applied to measuring a Return On Security Investment (ROSI). Here's a quick recap:
Read More

5 High-Value Cyber Security Solutions

Security consulting firms can offer a wealth of knowledge in protecting your business from the latest cybersecurity threats and vulnerabilities. The best security firms provide ...
Read More

Return on Security Investment: The Simple Formula [Part 1]

One can say that the real purpose of Information Security is to preserve value: the value of intellectual property, transactions, access to and dissemination of information, ...
Read More

Protecting Yourself from Petwrap or NotPetya or Petya

Watching news stories this morning on national media, it seems that the public feels somewhat helpless in how to defend themselves from the latest ransomware onslaught, ...
Read More

CIPHER ALERT - New Global Threat Petya or Petwrap

News of a new global ransomware attack began to emerge this morning (6-27-2017). Companies in Ukraine, Spain, the Netherlands, Denmark and the United Kingdom have already been ...
Read More

We Have Security Prevention Bias

One can say that there are three stages of information security operations: Prevention, Detection, and Response. Of the three, it is usually prevention that gets the most ...
Read More

ACDC Is ‘Stand Your Ground’ Cybersecurity Legislation

Representative Tom Graves (R-GA) released federal cybersecurity legislation in February 2017 (with updates in May) called the “Active Cyber Defense Certainty Act,” or ACDC. ...
Read More

After WannaCry: Practical Tips on How to Prevent Ransomware

Ransomware isn’t anything new, yet more than 3/4 of organizations targeted by ransomware attacks still do not have security in place that can prevent infection. What happens ...
Read More