zero trust

Let me explain what zero trust is in very simple terms. We inherently trust too much in our environment and our inclination to trust too many things has really led to us relying upon forms of security which are really not helping us in the new world order. This is especially true when we allow employees and outside users certain access to our system, such as uploading a document to a @Salesforce org.

Read More
winter games 2018

PYEONGCHANG (REUTERS) – Several US cyber security firms said on Monday (Feb 12) that they had uncovered a computer virus dubbed “Olympic Destroyer” that was likely used in an attack on Friday’s opening ceremony of the Pyeongchang Winter Games. Games Organisers confirmed the attack on Sunday, saying that it affected Internet and television services but did […]

Read More
SOX cybersecurity

The Sarbanes-Oxley Act (known as SOX) went into effect in 2002 to protect shareholders and the general public from accounting errors and fraudulent practices of organizations. It was also tailored to improve the accuracy of corporate disclosures. To remain SOX compliant, organizations must have effective security controls in place to ensure the confidentiality, integrity, and availability […]

Read More

A week after #Allscripts was hit with a #ransomware attack that disrupted patient care services of hundreds of its healthcare clients, a class action lawsuit has been filed against the cloud-based electronic health records vendor for allegedly "failing to secure its systems and data from cyberattacks, including ransomware attacks."

Read More
Category One

This week, the head of Britain’s National Cyber Security Centre (NCSC), Ciaran Martin, said something rather alarming in a newspaper interview that generated plenty of headline heat – the UK has never suffered the most serious category one (C1) cyberattack but it is only a matter of time before it does.

Read More
5 laws of cyber security

So without further ado, here are my five laws of cybersecurity, and while there could easily be more, these five will forever be the immutable universal constants that govern this topic and our existence in relation to it.

Read More
responsible

Clearly, cybersecurity is everybody’s problem, making everyone responsible. It's high time this truth was recognized, starting with the executive suite on down.

Read More
Spectre and Meltdown

Spectre and Meltdown are the names of two serious security flaws that have been found within computer processors. They could allow hackers to steal sensitive data without users knowing, one of them affecting chips made as far back as 1995. What are Meltdown and Spectre? Meltdown is a security flaw that could allow hackers to bypass the […]

Read More
russian hackers

A previously unknown ring of Russian-speaking hackers has stolen as much as $10 million from U.S. and Russian banks in the last 18 months, according to a Moscow-based cyber-security firm that runs the largest computer forensics laboratory in eastern Europe. The MoneyTaker group broke into 20 systems, which includes 15 U.S. lenders, targeting ATMs with […]

Read More

Security advocates finally seem to have the public's attention, and the hope is that people -- including lawmakers -- will take their advice more seriously.

Read More