The War Room
During a large incident response, bringing everyone together to a "war room" can be the difference in a speedy recovery, but there are downsides as well. The biggest? Fatigue & burnout. How do you monitor and handle that?
During a large incident response, bringing everyone together to a "war room" can be the difference in a speedy recovery, but there are downsides as well. The biggest? Fatigue & burnout. How do you monitor and handle that?
Google recently conducted a complete security & privacy review of various APIs associated with Google+. The result? The service is shutting down and they found a vulnerability. Did they take the proper steps in disclosing the issue?
With the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, it's important to look at things objectively. Here are a few tips around evaluating cybersecurity news.
Bloomberg has an absolutely earth shattering report citing a hardware supply chain attack that—they say—impacted several big names. Here's why this type of attack is so difficult to defend against but also near impossible to execute.
Criminals are winning the battle against security practitioners. Need proof? Look no further than the new headlines in any given week.
October is National Cybersecurity Awareness Month (#NCSAM). Look for tons of great content online as the community comes together—globally, not just nationally—to try and raise awareness of cybersecurity and privacy issues.
Security is a quality issue. Except we don't treat it that way and that's costing us dearly.
With the initial set of cybersecurity basics segments done, I'm think it's worth moving to a "basics" basics series. The goal would be to help everyone understand how the internet works, how email is structure, etc. Thoughts?
Built-in security is always best. That's "security by design", but when that fails (due to mistakes, oversight, humans), built-in security steps up...or, um, in.
In your personal life you're assessing risk constantly whether you know it or not. In the digital world the same thing happens BUT you probably don't have the required context to make an informed decision.
Risk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a "friendly" attack with the idea of find issues before cybercriminals do. Together they are a strong set of practices to help you defences.
Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.