Taming the Wild, Wild World of Cybersecurity
There is remarkably little consensus on reliable sources for cyber defense. Rarely has so much been invested with so little assurance of knowledge?
When It Comes to DIKW, It’s Never Easy to Get Smart
The pyramid of Data-Information-Knowledge-Wisdom (DIKW) has become a critical element for defending against network contamination and sabotage.
The Simple USB Flash Drive is Not So Simple After All
Widespread are the daily breaches in which authorized personnel thoughtlessly charge or sync their personal mobile device through a USB port at work.
The Future of Cybersecurity Spending
According to a report released by data-security company Varonis, cybersecurity budgets have increased by 141 percent between 2010 and 2018.
The Physical Side of Cybersecurity
In most organizations, the obvious, physical points of access into data and information systems – namely, USB port – are simply left unguarded.
The Urgent Gap in Cybersecurity
So much action and activity is seen in cybersecurity today that the dramatic increase in spending for it has been described as climbing a mountain.
Safeguards Versus “The Perfect Weapon”
The mystery of cyber warfare is that many of the most impactful attacks came not through the Web or the cloud, but rather through the humble thumb drive.
Why Should the Obvious be Strange?
Chilling research has demonstrated that even the best-intentioned workers don’t hesitate to connect personal devices to the data system at work.
The Greatest Unguarded Threat to Network Security
The data ports and cable connections of data and IT networks offer the easiest, most numerous points of access for data theft, compromise, and infection.
Uncompromising Urgency
Most data security solutions depend on responding to threats after they occur. A rapid-reaction force doesn't replace the need for a perimeter of security.
Hiding in Plain Sight – the Essentials of Cybersecurity
What’s missing in most organizations is systematic protection for the physical points of access to their data network and information systems.
2019: The Year of the Data Breach
Four billion records, including credit card numbers and other sensitive information, have been exposed through data breaches in the first half of 2019.