ATLANTA  The slaying of five dozen people in Las Vegas did little to change Americans’ opinions about gun laws. The nation is closely divided on whether restricting firearms would reduce such mass shootings or homicides, though a majority favor tighter laws as they have for several years, according to a […]

U.S. Certainly Divided on Gun Control Issue

(Video Transcript) For terrorists – which would include anyone seeking to strike terror into the hearts of large numbers of people – soft targets are a practical convenience with symbolic value. Soft targets are defined as those potential victims, or victim groups, that are relatively unprotected or vulnerable.  Usually because […]

Soft Targets – What can be done to protect them

This is “In 2 Minutes,” brought to you by Brilliance Security Magazine, the video series that tells you what you need to know about important security-related topics, in just 2 minutes.  Today we will review the WatchGuard Internet Security Report for Q2 of 2017.   WatchGuard recorded data from over […]

In 2 Minutes: Review of WatchGuard’s Internet Security Report

This is “In 2 Minutes,” brought to you by Brilliance Security Magazine, and today we will tell you what you need to know about Ransomware, specifically the 2017 Ransomware Report by Cybersecurity Insiders. Ransomware is a billion dollar cybercrime industry and is widely seen as the single biggest cybersecurity threat […]

In 2 Minutes: Ransomware, what you need to know

The Internet Security Law of the People’s Republic of China puts proprietary information of companies that conduct business in China, or that hire Chinese citizens, at risk – or at least that is what is being reported by international media and U.S. Government agencies.  On the face of it this […]

The Internet Security Law of the People’s Republic of China ...

On September 21, 2017, Rex W. Tillerson, U.S. Secretary of State, addressed The United Nations Security Council in New York City.  The focus of his remarks was the worldwide implications of nuclear proliferation.  While affirming that the threat of nuclear attack is a grim reality of today’s world, Secretary Tillerson […]

Rex Tillerson: The Threat of a Nuclear Attack Remains a ...

Amsterdam, September 20, 2017 – Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last […]

Records breached in 1H:2017 up 164% over 1st half of ...

by: Sripati MS Information Security Consultant at a leading security service provider in Oman   I came across this rant (with the usual don’t-kill-me-am-just-making-a-random-statement-and-fully-intend-to-get-away-with-it disclaimer) on LinkedIn about how CISO’s are clueless about how a virus works, even with CISA/CISM and a decade’s experience under their belt. It got me seething about how this statement is […]

Please don’t kill your CISO if he doesn’t know how ...

  Network intrusions have in the past cost businesses lots of money and information, prompting most of these companies to start thinking of ways to reduce the risk of intrusion. Not a single network can be fully secure but with the deliberate effort against attacks, it is possible to save […]

10 Ways to Reduce the Risk of Network Intrusions

With today’s complex threats, physical security has unfortunately taken a back seat As few as 15 years ago, if you mentioned security to someone in the business world, they would immediately think about alarm systems, badge readers and door locks. Some years back, I visited the Equifax Atlanta data center, […]

Physical security: The overlooked domain

By: Guurhart From a Gartner paper, what do you think of these 5 types of SOCs? Which should a medium/large size enterprise aim for? The NOC&SOC together does make sense to me, for broadening the skills of everyone over time, but maybe the lack of specialization will hurt your Infosec DFIR […]

5 models for SOCs – which is more effective?

By: 1337Mark – Information Security Manager at A Company Dear CISOs If by now you have not yet already implemented application whitelisting‍ or decided to do so within the foreseeable future, I hope to change your minds. Application whitelisting has become or should at least be regarded as a norm by now […]

CISO brief: The watertight case for application whitelisting

According to Gartner, Inc., the worldwide public cloud services market is projected to grow 18 percent in 2017 to total $246.8 billion, up from $209.2 billion in 2016. With such rapid growth it should be easy to build a profitable cloud business, right? Not so fast. Despite favorable market conditions, […]

8 Steps to Build and Execute a Profitable Cloud Business