Amsterdam, September 20, 2017 – Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last […]

Records breached in 1H:2017 up 164% over 1st half of ...



by: Sripati MS Information Security Consultant at a leading security service provider in Oman   I came across this rant (with the usual don’t-kill-me-am-just-making-a-random-statement-and-fully-intend-to-get-away-with-it disclaimer) on LinkedIn about how CISO’s are clueless about how a virus works, even with CISA/CISM and a decade’s experience under their belt. It got me seething about how this statement is […]

Please don’t kill your CISO if he doesn’t know how ...



  Network intrusions have in the past cost businesses lots of money and information, prompting most of these companies to start thinking of ways to reduce the risk of intrusion. Not a single network can be fully secure but with the deliberate effort against attacks, it is possible to save […]

10 Ways to Reduce the Risk of Network Intrusions


With today’s complex threats, physical security has unfortunately taken a back seat As few as 15 years ago, if you mentioned security to someone in the business world, they would immediately think about alarm systems, badge readers and door locks. Some years back, I visited the Equifax Atlanta data center, […]

Physical security: The overlooked domain


By: Guurhart From a Gartner paper, what do you think of these 5 types of SOCs? Which should a medium/large size enterprise aim for? The NOC&SOC together does make sense to me, for broadening the skills of everyone over time, but maybe the lack of specialization will hurt your Infosec DFIR […]

5 models for SOCs – which is more effective?



By: 1337Mark – Information Security Manager at A Company Dear CISOs If by now you have not yet already implemented application whitelisting‍ or decided to do so within the foreseeable future, I hope to change your minds. Application whitelisting has become or should at least be regarded as a norm by now […]

CISO brief: The watertight case for application whitelisting


According to Gartner, Inc., the worldwide public cloud services market is projected to grow 18 percent in 2017 to total $246.8 billion, up from $209.2 billion in 2016. With such rapid growth it should be easy to build a profitable cloud business, right? Not so fast. Despite favorable market conditions, […]

8 Steps to Build and Execute a Profitable Cloud Business


Schneider Electric Study Highlights Cross-Industry Trend to Move Security Applications to the Cloud Almost half of IT and security leaders surveyed are likely or extremely likely to transition security operations to the cloud in the future Leaders encourage technological advancements, yet barriers prevent organizations from achieving their security goals ANDOVER, […]

Cloud Security – By the Numbers



By: Rob Chaykoski, Consultant at RC Consulting and Managed Security I remember the first risk assessment I was to complete. It was messy essay on defining the use of a specific port to allow an application through our firewall. Truthfully, it was downright ugly to get to the point that the […]

Assessing Risk – Helping the SMB market understand



By Dave Howe OK, so thought I would write this one up in more detail. The cheapest way to build a home lab for pentesting purposes is virtualization – obviously, physical hardware is still required, but provided you have an existing machine with enough ram, that is good enough (my […]

Home Lab on a shoestring



by Gina Roberson, Analyst This post is inspired by Bally Kehal‍s series on “how to become X”. What is a security analyst? Security analyst is a very broad job description containing a lot of sub-categories. In theory it’s someone analyzing something security, right? Security analyst can cover everything from someone […]

How to become a Security Analyst


I’ve been writing about bots and ad fraud over the last several years. And despite the proliferation of bot and Fraud Detection services, the ad fraud problem is not getting better. In fact, it is getting worse. But occasionally, you read industry reports that say fraud is lower and tout […]

Any Device with CPU + Internet Can be Used as ...