The Critical Security Controls – Control 4

Control 4:  A framework for an offense-informed defense.    As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Four. This control is a ‘Basic control’ and represents one which every…

Details

Ransomware and other Destructive Malware

Ransomware and other Destructive Malware; It Makes You WannaCry   Ransomware is often considered the scourge of the cyber-business community. It’s damaging, disruptive, and outright unwelcome. That is unless you are the criminal behind the malware. At the intersection of two leading-edge technologies – Cryptography and Cryptocurrency – exists exceptional opportunity. The opportunity to develop…

Details

The Critical Security Controls – Control 3

Control 3: A Framework for an Offense-informed Defense As we discussed in our earlier blog posts on the 20 Critical Security Controls, they provide an offense-informs-defense framework through which an organization can effectively defend against cyberattacks.  In this installment, we’re examining Control Three. This control is a ‘Basic control’ and represents one which every organization,…

Details

RSA: and it Begins

RSA Day 1:        4-16-18 Each year, the cybersecurity world converges on San Francisco for a week to collectively advance the state of security. Over 50,000 professionals come together to make the RSA Conference one of the largest gatherings of its kind. The unique value of this gathering is derived both through the…

Details