Is Data The New Weapon Against Cyber Attacks?

Cybersecurity is in the news and for good reason. Many of us have experienced firsthand what cybercriminals can do with our credit card numbers and our personally identifiable information being sold on the black market. In government, though, the stakes are higher. So it shouldn’t be a surprise that cybersecurity is on GAO’s High Risk List. Vulnerabilities abound in today’s technology-dependent world, and cybercriminals excel at exploiting weakness. Fortunately there are weapons organizations can deploy to fight back, and they fall into three main categories: people, tools, and data.

7 Questions About Incident Response Every CISO Must Be Able To Answer

Anybody who has anything has something worth stealing. Today’s advanced cybersecurity threats are putting CISOs on the hot seat. And while detection and prevention remain the staples of security, effective incident response has become critical to the bottom line. When (not if) you are breached—how will you investigate, and how will you respond? This post explores 7 important questions that every Chief Information Security Officer must be able to answer about incident response.

Tips On How To Prepare for a Data Breach

The cybersecurity headlines have gotten bigger, bolder, and more prevalent as 2014 draws to a close. Not surprisingly, as a result of these costly cyber incidents, there has been much discussion about how to prevent—how to detect—and how to prepare for cyber attacks, including my recent article in InformationWeek’s Wall Street & Technology: "5 Tips On How To Prepare For A Data Breach."