Insurance Carrot Beats Government Stick in Quest for Stronger Cybersecurity

When it comes to cybersecurity, the U.S. federal government recognizes the carrot is more effective than the stick. Instead of using regulations to increase data security and protect personal information within private organizations, the White House is enlisting the insurance industry to offer incentives for adopting security best practices. In March 2016, the U.S. House [...]

The Cybersecurity Canon: How to Measure Anything in Cybersecurity Risk

We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.  The Cybersecurity Canon [...]

Calling All Women in Technology: Japan’s Cybersecurity Field Needs You

This post originally appeared on Context: By New America Where were all the Japanese women? I was asking myself that question while participating in the Grace Hopper Celebration of Women in Computing conference last month, one of the largest global conferences for women in IT. At the conference, I spoke with dozens of female college [...]

What Are Unknown Cyber Threats? (And Are They Really Unknown?)

Most traditional security products are built to act based on known threats. The moment they see something that is known to be malicious, they block it. To get past security products that successfully block known threats, attackers are forced to create something that is previously unknown. How do they do it, and what can we [...]