Ineffective Response and Perverse Insurance Incentives Compound Ransomware Problems
Cybercriminals are mining a lucrative revenue source – ransomware. These attackers launch malware to encrypt digital files and demand bitcoin payment to unlock them. We know that local governments are often paying ransom and that private industry is also suffering… Continue reading
Did Capital One Respond Well to an “Erratic” Data Breach?
On July 19, Capital One Financial Corporation determined it had sustained a data breach of over 106 million user records due to a cyberattack by a user named “Erratic” on Twitter. The company announced the breach to the media July… Continue reading
April 26: Dan Beckett Speaking at ISACA Chapter Event
Cyber-Resilience and privileged access management (PAM) will be front and center April 26, 2016 at ISACA’s Central Arkansas Chapter with a full-day seminar from Dan Beckett, one of our Managing Partners.
Two-Part Seminar
Incident Response
Cyber-Resilience in the… Continue reading
Complimentary Webinar: Cyber-Resilience in the Face of a Breach
Two weeks ago I stood before a conference crowd at Cyber Security World 2015 and said: “I hate the term cybersecurity.” And proceeded to give essentially the same presentation that we’ll now bring to all of you through… Continue reading