August 30, 2015 /
Phishing and spear-phishing are growing problems. The clever enticements to click are getting more sophisticated and more targeted than ever. The data breach costs are mounting. What can your organization do to take phishing awareness and response to the next level?
August 23, 2015 /
Many government technology leaders are struggling. From national headlines to local audit findings, the majority of the news has not been good. Meanwhile, public trust in government as a whole is near historic lows. What can be done? Is it time for reinvention? Back to the drawing board? If so, there is a lot to learn from the journey and actions of Tim Tebow.
August 16, 2015 /
The technology and security industries are struggling to keep up with an ever-growing list of problems and cyberattack vectors. There has been a consistent call for new solutions to address evolving cyberspace challenges. One popular answer: New innovative startup companies to help. In order to accelerate these companies, the 'Security Startup Challenge' was formed earlier this year by Kaspersky Lab and several partners. And now, we have the winners.
August 9, 2015 /
A new survey of top IT executives reconfirms the findings from other recent cybersecurity studies regarding the online defense at utilities and other vitally important public- and private-sector organizations. The report outlines what is good and what needs improvement in our online defense of critical infrastructure facilities.
August 2, 2015 /
A series of recent news headlines reveal cybersecurity experts, who were being paid to defend networks, battle malware and fight cybercrime, were actually black hat hackers. What happened and what can be done to address this growing trend? Is your enterprise prepared?
July 25, 2015 /
Talking about security in effective ways is hard – whether the audience is an auditorium full of professionals or a small room at home with a few children. Here are some tips to help.
July 19, 2015 /
How well do you know your IT infrastructure? Who is communicating with whom across your network backbone? What systems are bandwidth starved? With legacy systems, PII data, hundreds of networks, complicated databases, hybrid clouds, data warehouses, countless mobile devices and outsourced functions needing 7x24 access, how do you determine what's truly secure? As we prepare for the new Internet of Things (IoT) era, here are some questions that need answers now.
July 12, 2015 /
On July 8, 2015, a string of major computer outages occurred at approximately the same time - grabbing global media attention. Significant operational disruptions occurred as a result of computer incidents at the New York Stock Exchange (NYSE), the Wall Street Journal (WSJ) and United Airlines. The nation briefly 'woke-up' to our reliance on technology and got a small taste of the fear that may come if a cyberattack cripples critical infrastructure. What lessons can we learn from these incidents? How can public and private-sector enterprises better prepare for more inevitable disruptions?
July 5, 2015 /
Network failures. Colossal data breaches. Global online privacy problems. The bad news reignites debate. Do Internet troubles necessitate a new start? Is it time to push the 'reset' button? But others say that cyberspace is improving and will go much further -- even solving a long list of historic problems. One thing is indisputable: The Internet is changing rapidly before our eyes.
June 28, 2015 /
A recent article in The New York Times describes a highly coordinated disinformation campaign using social media. This scary development raises new questions about the reliability of alerts and other emergency communications that rely on social media platforms. Will disinformation campaigns become a growing trend that will undermine recent advances in spreading important information during emergencies?