By Katherine Teitler

April 25, 2017

Sweet dreams (are made of this)

There’s a phrase that’s oft repeated when a person is trying to understand what’s on the mind of and what motivates another person: What keeps you up at night? This question is regularly posed to business executives—during sales efforts, in interviews, and at conferences—as the industry attempts to learn the inner workings of executives’ thoughts and then align policies and procedures with what’s important to the head honcho. 

Read more ...

By Kristy Westphal

April 24, 2017

Does this sound familiar? You forward a big spreadsheet containing all kinds of security operations numbers to your management team to demonstrate your team’s value, but management is left on their own to make heads or tails of what you’ve sent. As you press “send,” you can almost hear the loud sighs coming from managements’ offices.

Read more ...

By Joshua Marpet

April 19, 2017

Idiots Abound

Occasionally, I, like many people, am an idiot. Let me explain: Driving to a wedding on a recent Sunday, I needed to put some gas in the car so I stopped at a rest stop along the way. Befitting of the event to which I was headed, I was wearing a suit. Now, while wearing a suit I dislike putting items in my trouser pockets, as suit pockets aren’t designed for bulky items, like a wallet. 

Read more ...

By Marcos Colón

April 18, 2017

It’s nearly 6 a.m. and you lean over to your nightstand to turn off an alarm that’s bound to go off any second. After hitting snooze a couple of times, you can’t risk getting caught up in the next REM cycle. You want to, but there’s too much to do at the office.

You grab your smartphone, adjust the brightness so you don’t blind yourself, then, a notification catches your attention. This alert isn’t normal. 

Read more ...

By Ed Moyle

April 17, 2017

It’s a truism that there are things in life for which “visibility” is out of proportion to importance. Anyone who has ever had a plumbing issue—say a backed-up drain or a leak—has experienced this firsthand. We all rely on functional plumbing, but it usually operates seamlessly and outside our scope of awareness; in fact, it operates so seamlessly that unless there’s a catastrophic failure we tend not to notice it operating at all. 

Read more ...

By Katherine Teitler

April 12, 2017

Web application coding errors provide ample opportunity for exploitation by malicious actors. With the average number of applications in use by organizations on the rise, any undetected or unpatched vulnerability heightens risk, not just for specific users of that application, but for the entire organization. 

Read more ...

By Lance James

April 11, 2017

Anyone who has access to the news today is starting to form an interesting picture of the world in which we security practitioners live. Topic analysis of recent press and other media reports returns inclusion of terms such as “hacking and elections,” “espionage,” “foreign intelligence,” “treason,” “wiretaps,” and “surveillance.” Countries associated with hacking and related topics include North Korea, Russia, China, and Iran. Even insurgent groups such as ISIS appear to maintain their own hacking teams.

Read more ...

By Katherine Teitler

April 10, 2017

Building a mystery

A security team—just like any functional area team—is made of up unique individuals with distinct personalities and working styles. While the team as a whole needs to work towards shared goals, regardless of what those goals may be, one common misconception about governing a team is that an effective team leader develops and enforces standards that have team members working in a similar fashion, tackling projects the same way, and following the “rules” of how a task should be completed. 

Read more ...

By Marcos Colón

April 6, 2017

Security practitioners are starting to wrap their heads around the notion and practices tied to threat intelligence. Considered one of the top buzzwords in the industry today, there’s one common characteristic tied to threat intelligence that’s clear - it can mean different things to different people.

Read more ...

By Katherine Teitler

March 30, 2017

Hard habit to break

Americans’ online security habits are just as bad as you’ve imaged, according to a recent survey of more than 2,000 respondents. Any enterprise security practitioner is likely thinking, “I don’t need a survey to tell me how bad users are,” but putting the scope of the problem into concrete terms is helpful for managing and evolving the corporate security program—which is at least somewhat dependent on end users’ cooperation.

Read more ...

By Katherine Teitler

March 29, 2017

The hard way

Earlier this month when WikiLeaks released what appears to be a repository of hacking tools and techniques used by the Central Intelligence Agency, the initial reaction was shock and awe (mostly by mainstream media), followed quickly by piqued interest (mostly from the security community), then a bit of annoyance (again in the security community) when WikiLeaks backed slightly away from its promise to help affected tech companies patch the vulnerabilities identified in the documents. 

Read more ...

By Jack Jones

March 27, 2017

The cyber risk landscape is complex and dynamic, which makes it inherently challenging to manage.  Add the fact that organizations have limited resources and, well, sometimes it can feel unmanageable.  How on Earth are we supposed to get everything done that needs to be done? The simple and unavoidable answer is, we don’t. We can’t. There are just too many things that could demand our attention.  

Read more ...

By Joshua Marpet

March 24, 2017

If a small business CEO thinks about compliance, he or she might think it’s relegated to big businesses. Who else has the funding, the personnel, and of course, the time to attend to compliance? And does it really matter anyway? Who’s going to come after a small business that doesn’t have a compliance department or deep pockets to sue?

Read more ...

By Katherine Teitler

March 22, 2017

As if protecting organizational systems from data theft and abuse weren’t a big enough challenge, “Poor cybersecurity hygiene is now having life-altering effects” says Joshua Corman, Director, Cyber Statecraft Initiative at the Atlantic Council. 

Read more ...

By Dominic Vogel

March 21, 2017

Cybersecurity frameworks are quite similar to relationships—you get out of them what you put into them. To some extent, we have all waded into the waters of cybersecurity frameworks. However, unlike an anti-virus rollout, you can’t half-ass it.

Read more ...

Event Search

Download Catalog Dark Blue 300x58

Subscribe to Newsletter LightBlue 2 300x58

Register Adv. Persistant Threat 300x58

MIS|TI Tweets

ACL MISTI Grey 300x58

Please choose your region

Submit
Select a Region
United States
United Kingdom/Ireland
Africa
Americas
Asia-Pacific
Europe
Middle East

By continuing to use misti.com you will be agreeing to the website Terms and Conditions, the Privacy Policy, and the Use of cookies while using the website.