By Joshua Marpet

March 24, 2017

If a small business CEO thinks about compliance, he or she might think it’s relegated to big businesses. Who else has the funding, the personnel, and of course, the time to attend to compliance? And does it really matter anyway? Who’s going to come after a small business that doesn’t have a compliance department or deep pockets to sue?

Read more ...

By Katherine Teitler

March 22, 2017

As if protecting organizational systems from data theft and abuse weren’t a big enough challenge, “Poor cybersecurity hygiene is now having life-altering effects” says Joshua Corman, Director, Cyber Statecraft Initiative at the Atlantic Council. 

Read more ...

By Dominic Vogel

March 21, 2017

Cybersecurity frameworks are quite similar to relationships—you get out of them what you put into them. To some extent, we have all waded into the waters of cybersecurity frameworks. However, unlike an anti-virus rollout, you can’t half-ass it.

Read more ...

By Kris Lovejoy

March 17, 2017

In today’s threat landscape you either hunt or you’re hunted. As organizations around the world are dealing with the sophistication of today’s hackers, they are recognizing that proactive approaches are needed to address advanced cyber threats. In many cases, they are turning to new concepts like cyber hunting.

Read more ...

By Katherine Teitler

March 16, 2017

I’ve got spies

Concern around data privacy is on the rise. In the U.S., the Snowden revelations ratcheted up the noise on a consumer level, and the U.K.’s General Data Protection Regulation (GDPR) is forcing companies worldwide to think more seriously about data privacy (in addition to protection). Privacy is oftentimes conflated with security since both areas have a responsibility to keep private data private. However, in reality, these are separate functions with individual duties, though the success of a privacy program is largely dependent on a strong partnership with security, says Kevin Haynes, Chief Privacy Officer at the Nemours Foundation.

Read more ...

By Randall Brooks

March 15, 2017

Challenges with development for the cloud

Application exploits have become daily news, and as a result, application security and secure coding are developing focus areas of cybersecurity. While the industry has talked about application security and secure coding for some time, these areas have not received the attention they deserve. 

Read more ...

By Marcos Colón

March 14, 2017

The fire department typically has a response plan they can put into use when a building is ablaze, involving equipment, angles to take on the fire, and what to do after the flames have been put out. The same goes for a SWAT team responding to any tactical emergency that warrants their attention, or a public relations agency that steps in when a celebrity or brand is in danger following a controversial event.

Read more ...

By Katherine Teitler

March 13, 2017

We can work it out

A new study published by BAE Systems highlights the disconnect between C-level executives and IT decision makers when it comes to perceptions of cybersecurity within the enterprise. The report, based on survey data from 221 C-level executives and 984 IT decision makers across the globe, compares the two groups’ concerns about cyber attacks, their companies’ capabilities in handling threats, and what is required to defend the enterprise more effectively.  

Read more ...

By Katherine Teitler

March 8, 2017

It's a mistake

Anyone who has worked in a corporate environment for any appreciable amount of time has been asked to give a presentation of one sort or another. Regardless of role or responsibilities, you’d be hard pressed to find a professional that hasn’t, at some point, worried over the details of what he or she was going to say and how to put together the best and most appropriate accompanying visual aid.

Read more ...

By Gary Sheehan

March 8, 2017

Resiliency sounds like a common-sense approach to business. Each organization must anticipate, prepare for, and adapt to change and disruptions in order to survive and prosper. Who wouldn’t want to do that, right? But like many things in the real world, moving from theory to executional excellence is a bit more complex.

Read more ...

By Marcos Colón

March 3, 2017

Cyber attackers have figured out how to take organizations down within seconds. Gone are the days when they’d penetrate a network and scour it for valuable information to siphon. Now, it’s as easy as leveraging one piece of malware to seize the entire trove of data and hold it for ransom. 

Read more ...

By Katherine Teitler

March 2, 2017

We’ve only just begun

On March 1, 2017, New York State became the first state in the nation to impose cybersecurity-specific regulation on financial services organizations operating within its borders. According to the press release on the Department of Financial Service’s (DFS’s) website, dated February 16, 2017, the stated aim of the regulation is to “protect New York’s financial services industry and consumers from the ever-growing threat of cyber-attacks.”

Read more ...

By Katherine Teitler

March 1, 2017

The security operations center (SOC) is a critical element of running a situationally aware and highly responsive security organization. Unfortunately, many companies today don’t have the resources to form a SOC, much less manage one that integrates seamlessly with existing security and networking teams. Companies that can fund, staff, and operate a SOC often find themselves with two separate security-focused teams—security and security operations—that present different skill sets, capabilities, reporting structures, and processes. 

Read more ...

By Ben Rothke

February 28, 2017

The 1996 movie Jerry Maguire popularized the catchphrase “Show me the money!" Skip ahead two decades and ransomware authors are shouting a virtual “Show me the Bitcoin!” While I won’t be shouting that, I will be giving a presentation on the topic, “Dealing with Cyberextortion, Ransomware, and Other Bad Stuff” at InfoSec World 2017 in April. 

Read more ...

By Katherine Teitler

February 24, 2017

Too much time on my hands

In April 2016, the European Union General Data Protection Regulation (GDPR) was approved by the EU Parliament “after four years of preparation and debate.” Compliance with the new law becomes mandatory on May 25, 2018, and given the complexities of adherence, companies are starting to scramble to put plans in place. While the law itself is an EU regulation, its impacts will be felt by any company that collects, stores, or uses data from or about EU citizens. 

Read more ...

By Katherine Teitler

February 23, 2017

Imagine

In biology, it is well known that genetic diversity creates strength in that it helps build resilience to disease, disorders, and other human ailments. At a community level, we also find strength in diversity. Individuals from different backgrounds, experiences, upbringings, geographies, cultures, races, and religions all contribute ideas, talents, and skills that make us stronger as a group. 

Read more ...

Event Search

Download Catalog Dark Blue 300x58

Subscribe to Newsletter LightBlue 2 300x58

Register Cloud Security eSummit 300x58

MIS|TI Tweets

ACL MISTI Grey 300x58

Please choose your region

Submit
Select a Region
United States
United Kingdom/Ireland
Africa
Americas
Asia-Pacific
Europe
Middle East

By continuing to use misti.com you will be agreeing to the website Terms and Conditions, the Privacy Policy, and the Use of cookies while using the website.