Security

Security Measures that Build Trust


Security

Data Security – The Non-Obvious Facets

August 27th, 2018

A lot is already known and experienced about data security. This blog tries to slice and dice the data security paradigm differently, with the aim of providing a different perspective. The hope is that, different perspectives lead to different viewpoints, thoughts, realizations and ideas. If this blog creates a new thought or idea, and leads to an ‘aha’ moment, then it’s a purpose well served.

Continue reading...

Security

TrustCheck: Challenging Assumptions in Cyber Risk Management

July 27th, 2018

When I was 12 years old, my dad told me, “Never assume, it makes an ass out of u and me.” I don’t recall the context of the discussion, but I do remember responding appropriately with a groan. As I got older, I realized that assumptions are a necessary part of decision-making. But it’s also wise to challenge those assumptions—any time I start to question mine, I think back to that #DadJoke. Cyber risk management is heavily dependent on assumptions. As security leaders, we rely on heat maps, vulnerability counts and patches.... read more.

Continue reading...

Security

Modern Tools for Today’s Growing Threat Landscape

July 27th, 2018

Warmer days bring greener landscape, but with this growth comes maintenance, such as weekly grass trimming. The lawn mower has evolved from sheep, to scythe, to reel cutter, to engine-powered blades—now in the computer age, it uses automation to mow consistently and constantly. Trading my gas-powered lawn mower for a robotic one, I finally decided to stop applying 20th century technology to my 21st century landscape. So why are we not doing the same for cybersecurity?

Continue reading...

Security

Why Do Some Travellers Resist the Use of Biometrics?

June 27th, 2018

The Unisys Security Index revealed that 75% were willing to use a biometric to confirm their identity at an automated boarding gate when boarding a flight and 71% were willing to use a biometric to identify themselves as a frequent traveller of low security risk. This is good news for government agencies, airports and airlines that are expanding the use of biometrics as part of a seamless and secure travel experience. But it begs a question. Why are over 20% of travellers UNWILLING to use a biometric to identify themselves when travelling?

Continue reading...

Security

Protect the Critical: A New Approach to Cybersecurity

June 15th, 2018

With increasing demand for the free flow of data to conduct daily life, businesses and governments are forced to rethink how they made data and systems available. For security professionals, protecting the critical has become a boardroom concern of how to increase productivity without putting the organization at risk.

Continue reading...

Security

Managing Risk through Predictive Analytics

December 15th, 2017

Cyberattacks and threats continue to increase and their impact to business operations are becoming more detrimental. Security operations personnel are utilizing data received from monitoring systems to develop usage patterns and behaviors which predict the expected actions inside and outside a network. Are you geared up enough?

Continue reading...