BrandPost: New Opportunities, New Risks: The Internet of Things and Business...
The Internet of Things (IoT) is creating unprecedented opportunities for both individuals and organizations to gain greater value from networked connections among people, processes, data and things....
View ArticleBrandPost: Happy New Year – Now Time For That New Year’s Resolution…
As most of the working world slowly comes back online after the festive break and we all start thinking about fitness regimes and other changes to our lifestyles, we might want to consider a more...
View ArticleBrandPost: Paper, Plastic or Compromised Security? The Point-of-Sale Risk in...
As technology becomes smarter and more intuitive, conveniences like tableside payment kiosks in busy restaurants have become more commonplace, leading to highly personalized (and time-saving)...
View ArticleBrandPost: NSS Labs Report on Cyber Resilience Highlights the Need for a New...
A few years ago, a point-product security vendor proudly declared their technology was the silver bullet that stopped all security threats from penetrating the corporate network. Many of us in the...
View ArticleBrandPost: With Multi-Vector Attacks, Quality Threat Intelligence Matters
In the last year, the world’s attention has been riveted by a series of high-profile hacks of major corporations in retail, finance and the entertainment industry, among others. Each of these...
View ArticleBrandPost: Malvertising Is Not an Impossible Threat to Beat
Malvertising has been a problem for CIOs and CSOs for a few years. 2015 stands to be no different, as it is examined in the Cisco Annual Security Report for 2015. Malvertising tactics from...
View ArticleBrandPost: The Industrialization of Hacking: Part 1 – An Introduction
This is the first installment of a four part series over the next two weeks on The Industrialization of Hacking.The evolving trends of mobility, cloud computing, and the Internet of Everything (IoE)...
View ArticleBrandPost: The Industrialization of Hacking: Part 2 - The Cybersecurity Arms...
This is the second installment of our four part series on The Industrialization of Hacking. Previously, I introduced the concept of the Industrialization of Hacking, creating a faster, more effective...
View ArticleBrandPost: The Industrialization of Hacking: Part 3 - The Attack Chain
This is the third installment of our four part series on The Industrialization of Hacking. Previously, I discussed the risks and opportunities the Internet of Everything introduces for business and...
View ArticleBrandPost: The Industrialization of Hacking: Part 4 - A Threat-Centric and...
This is the final installment of our four part series on The Industrialization of Hacking. Previously, I discussed the risks and opportunities the Internet of Everything introduces for hackers and...
View ArticleBrandPost: Resilience: A Smart Strategy for Life, Business, and Cybersecurity
It is a well-known principle in both science and business that those who survive in this world are not necessarily the strongest or smartest, but those who best adapt to changing circumstances. I was...
View ArticleBrandPost: Data, Data, Everywhere…
It used to be a common sight on the street to see people walking along with their mobile phones clenched to their ears. But increasingly this has changed to the view of people heads down, looking at...
View ArticleBrandPost: Real-World Security is the Ability to Protect the Ultimate Asset:...
We recently released the Cisco 2015 Annual Security Report and have now used it as a platform to introduce the inaugural Cisco Security Manifesto. Our motivation for creating this set of security...
View ArticleBrandPost: Is it Time for That Spring Cleaning?
Spring cleaning is traditionally an activity undertaken as the seasons change in the home. But we in the business world would be well advised to take a leaf out of this particular book and expand the...
View ArticleBrandPost: Time to throw away the 80-20 security rule?
For many years security policies have been largely governed by the notion of the 80-20 rule. This states that 80% of security risk is effectively managed by implementing the most important 20% of...
View ArticleBrandPost: People Remain the Weakest Link in Security
A new survey was unveiled last week by the UK consumer association, which reported the top five email scams to be aware of for 2015.Anyone who checks their spam folder in their email regularly will...
View ArticleBrandPost: A World of Mobile Delights – And Dangers
As a consumer watching from afar, the announcement of new smartphones and other mobile devices coming out of the annual Mobile World Congress in Barcelona fill me with excitement. After all who can...
View ArticleBrandPost: Criminals shopping for your data
We know that Cybercriminals ‘follow the money’ and constantly target industries and individuals who can provide them with the most valuable data and information they can utilize to make money....
View ArticleBrandPost: Don’t Get Dazzled by the Shiny New Threat
The recently launched Verizon Data Breach Report 2015 gathered many news headlines because of its bold statement that security threats to your mobile phone are generally "overblown." The report...
View ArticleBrandPost: Spam continues to thrive thanks to ‘snowshoe’ strategy
Tech pundits and vendors have been prematurely declaring the death of email for over a decade. However, email remains the dominant form of communication for businesses and individuals around the world...
View ArticleBrandPost: Mind the Cyber Gap
The age of the Internet of Things and the Industrialization of hacking is transforming all businesses and the way they need to think and behave in a connected world. Further evidence of this was...
View ArticleBrandPost: Evaluating Threat Intelligence Solutions?
When you hear the term “Threat Intelligence,” it’s easy to have preconceived notions of what it means. Or, since it’s become security’s latest buzzword, to wonder if everyone talking about it means...
View Article
More Pages to Explore .....