Two KPIs Essential for Measuring Security Tools

Last month I discussed cybersecurity effectiveness, particularly in regards to the growing threat of fileless attacks. But effectiveness is only one piece of the equation. First and foremost businesses still need to go about their business. Unfortunately, it has long been the case that the more effective a cybersecurity tool is, the slower and more [...]

2017-09-26T13:33:05-04:00September 26th, 2017|Categories: Blog, Security|Tags: , , |

The Question of Advanced Attack Protection – Reframed

Arthur Braunstein is VP US Sales at Morphisec Getting good answers and outcomes often depends on asking the right question. The following question recently crossed my desk: “What is the best tool for detecting advanced cyberattacks, including fileless attacks?” Asked like this, the question suggests the only way to protect yourself from advanced [...]

2017-09-28T13:34:06-04:00August 29th, 2017|Categories: Blog, Security|Tags: , , |

Top 5 cybersecurity challenges for the midmarket

For years, midmarket companies had the luxury of not being the primary target of cyberattacks. Recent events, like the rapid spread of the WannaCry ransomware, show that SMBs can no longer rely on larger targets attracting the attention of hackers. Network security costs $178,000 a year for a typical mid-tier business, and this average budget [...]

2017-08-17T11:32:24-04:00August 17th, 2017|Categories: Security|Tags: , , , , |

The General Data Protection Regulation: What It Means and How Data Management Can Help

You're well aware of the feeling of dread that comes over someone when he or she hears that a company's store of personal data has been breached. They immediately start imagining worst-case scenarios. What have the hackers gotten access to – Social Security numbers? Credit card info? E-mail addresses? Dates of birth? The compromised company [...]

2017-08-22T13:48:50-04:00August 15th, 2017|Categories: Data Analytics, Security|Tags: , , |

Educating and protecting the mobile workforce

Failure to offer end user training stands to make or break a company’s financial or human capital investment in new products and business initiatives I recently shared my thoughts on improving new technology adoption rates. While these components are helpful to reducing IT project failures, the mobile workforce requires some additional attention and special considerations. [...]

2017-07-12T16:15:08-04:00July 12th, 2017|Categories: Mobility, Security|Tags: , , , |

Staying the Course

For more months than I care to recall, the catamaran on which I live in South Florida has been out of the water for some maintenance and repairs. A slight miscalculation out sailing last year carried one of her precious hulls across a jagged jetty and ripped a gaping hole in her bottom side. Another [...]

2017-06-29T09:36:40-04:00June 28th, 2017|Categories: Security|

CIO Panel: Security Challenges in the Midmarket

[sg_popup id="4" event="onload"][/sg_popup] Despite some of the most expensive fortifications on the market, CIOs and their technology teams in the midmarket struggle daily to stay ahead of malware and cyberattacks that stand to cripple their company's operations. Walid Ayoub - Human Rights Watch Global NGO Human Rights Watch was the victim of numerous attempted attacks by [...]

2017-07-12T13:00:25-04:00June 5th, 2017|Categories: Security|Tags: , |