How to Get C-suite Support for Insider Threat Prevention

How to Get C-suite Support for Insider Threat Prevention

If you’re not getting support and adequate funding from the C-suite to address insider threats, a recent report highlights a powerful persuasive tool you may have overlooked: money—as in fines (cha-ching), lawsuits (cha-ching) and credit monitoring services (cha-ching) you’ll have to pay as the result of a data breach. The IDC report, “Endpoint Data Protection [...]

Hack on Ukranian Power Grid Highlights the Urgency for Accelerated Threat Intelligence in Industrial Control Systems

Hack on Ukranian Power Grid Highlights the Urgency for Accelerated Threat Intelligence in Industrial Control Systems

Recent and more conclusive reports on the cyberattack of a Ukrainian power grid, such as the article reported in Wired Magazine, confirmed the level of sophistication of this campaign. The net result of a mass power outage for hundreds of thousands of people is mind-blowing, but the highly coordinated events leading up to the outage [...]

The Privacy Landscape in 2016

The Privacy Landscape in 2016

Privacy has made headlines for years now, and the rise of social platforms like Facebook has brought the issue into focus. In 2016, I expect privacy to remain at the forefront of technology news, especially with increasing digitization and technology innovations like Smart Cities, digitized transport and the Internet of Things (IoT). These technologies are [...]

Ignite 2016: Conquering the Cyber Range

Ignite 2016: Conquering the Cyber Range

The biggest and best Ignite Conference yet is in the books. Our heartiest thanks to everyone who made it so! Watch this space over the next few days for more from Ignite 2016, from behind-the-scenes photos and video to lots more action from the breakout rooms, exhibit hall and the late night festivities. For now, [...]