by: Steve Bowcut


Read all three pages of this infographic to understand the unique insight that Angela Oborne, Regional Director – Security & Technology Consulting at Guidepost Solutions brings to the security industry. You will learn about: The ASIS Young Professionals Council’s recent research How Millennials fit into the security industry What the […]

Guidepost Solutions – Angela Osborne – ASIS Young Professionals Council


With the ever-evolving threat landscape, increased concern regarding cybersecurity, and the convergence of IT operations and security, many believe that cybersecurity programs must take an all-inclusive approach in addressing security incidents and data breaches. Traditional incident response models primarily offer technical guidance; they are not designed to help organizations gain […]

Going Beyond Incident Response


Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...



Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...


The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...




The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk


Editor’s Note: Today SentinelOne announced the findings of its Enterprise Risk Index Report.  In this report, you will find interesting trends related to attacks detected for the period of January through June of this year.  You will see trends for Fileless, PowerShell, Ransomware, Executable, and Document attacks.  We have included their press […]

SentinelOne Unveils H1 2018 Enterprise Risk Index Report