Questions to Ask Your Cyber-Insurance Provider
The breach problem has increased and cyber insurance is on the radar screen for many CEOs. The U.S. Congress is likely to create supportive legislation for cyber-insurance as a vehicle for improved security data sharing and a market-based solution … Continue reading
Security Researcher Allegedly Hacks Into Commercial Passenger Airplane Flight Systems
According to the FBI, a security researcher may have hacked into commercial airplane flight systems from poorly-designed and poorly protected inflight entertainment systems (IFEs). If even the high-flying airline industry can’t protect its critical systems, what does that say… Continue reading
Key Cybersecurity Questions on Quantum Computing
Are we now looking at the cybersecurity equivalent of a nuclear weapon?
Source: D-Wave
The laws of physics are different at the atomic level than they are at the galactic, or planetary level. And because of that, quantum mechanics… Continue reading
Privileged Account Management (PAM) is Necessary, but Deploying it Stinks
As we looked into the topic of core defense in a recent series of blog posts and discussions, we concluded that privileged account management (PAM) technologies would be of great value in protecting the most sensitive IT assets… Continue reading
Was the Sense of Defeatism at RSA 2015 a Good Thing?
As the RSA 2015 conference (#RSAC2015) was winding down last week, someone commented on what he perceived as a “sense of defeatism.” In sessions and on the show floor “Every vendor is saying “you’re already penetrated.” There… Continue reading