Speaking on Cyber-Insurance Panel at the Gateway to Innovation Conference
I’ll be speaking at the April 29 Gateway to Innovation Conference at a panel on cyber-insurance, following a stage-setting presentation on the subject by former Governor Thomas Ridge. Cyber-insurance is a fascinating subject; when I last wrote about it… Continue reading
It Takes a Network to Fight Networks
At the RSA pre-conference Cloud Security Alliance (CSA) Summit both Philippe Courtot (CEO, Qualys) and Marc Goodman (Author, “Future Crimes”) highlighted the need for a paradigm shift in how enterprises and societies address cloud security.
Courtot finds… Continue reading
Certes Networks CryptoFlow Lays Security Overlay Atop Insecure Environments
Today, Certes Networks announced a new suite of CryptoFlow products, extending an enterprise security overlay capacity across mobile, cloud and external partner environments. Many enterprises are still struggling to make cybersecurity gains by implementing network zoning or segmentation within their… Continue reading
Critical Infrastructure Demands Proper Business Continuity Planning
IT is everywhere in critical infrastructure. The Internet. The electrical grid. The banking system. We don’t often think of the nationwide electrical grid (no matter what country you’re in) as a massive exercise in IT, but part of our critical… Continue reading
Regulations Create a False Sense of Security
We are approaching a very tenuous era with respect to both corporate and individual privacy, and you shouldn’t be surprised to see a lot of dominoes fall over the next few years. I believe there are two key reasons data… Continue reading
An Ominous Weaponization of Mobile Exploits
Another day, another mobile exploit. Last week we realized the dangers of public WiFi abuse are magnified by inexpensive hacker kits for snooping on our supposedly HTTPS-protected logins. This week, we learn of inexpensive IMSI catchers bringing cell phone… Continue reading