Cybersecurity Matters

George Hulme lends his expert insight into the latest developments in cybersecurity

Majority of organizations still report a lack of cyber security budget

empty-wallet

Despite years of widespread data breaches and increased regulatory demands, 75 percent of respondents to a recent survey do not believe that they have an adequate information security budget. Additionally, attackers continue to successfully use compromised credentials in attacks, and while 93 percent of organizations surveyed are aware of the vulnerability and attack technique — […]

Gartner: Future of identity management is mobile, SaaS

identity-management-on-mobile-device

By 2022, the research firm Gartner predicts 70 percent of enterprises that use biometrics for authentication will do so with smartphone apps. Last year, less than 5 percent of enterprises did so. According to Gartner, it is the lower cost and improved user experience that will drive this adoption of smartphone biometric authentication. Speaking of […]

Enterprise security and risk management efforts continue to lag

snail-on-keyboard

Increasingly, enterprises realize that they not only need to secure their digital assets, but that they need to do it economically. Most organizations know that they need to be compliant to any number of government or industry regulations that affect them — from HIPAA to GDPR — but simply achieving compliance doesn’t mean an organization […]

Study: Hospitals dramatically increase ad spend following data breaches

healthcare-data

Determining the actual cost of a data breach is difficult and often leads to heated discussions in security circles. How do you determine how many customers who left (following a breach) wouldn’t have left anyway? Perhaps they already were upset with the organization for some other reason. How do you know if a sales decline […]

Old password habits die hard … if they ever die at all

bad-password-habits

If there’s anything that security and IT teams hate more than managing credentials, I certainly can’t think of it. Users hate having to manage their passwords and they tend to do so poorly. And that, in turn, leads to password reset request calls — among the most costly of helpdesk service call types. (By the […]

What are the priorities for CISOs in 2019?

ciso-priorities

Well, 2018 is a wrap and another year is behind us — and what a big year it was for cybersecurity. There have been numerous high-profile breaches, regulatory fines, and fascinating developments in how enterprises build and deploy their applications. And, more broadly, business transformation efforts have accelerated the speed of business change. It’ll be […]

NIST releases guidance for risk assessment automation

risk-assessment

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to a multitude of cloud services. Meanwhile, they’re having difficulty finding skilled staff, and their development teams have been busily dismantling traditional waterfall development lifecycles for continuously delivered pipelines. While cloud, mobile, containers, microservices, and serverless […]

Lights out: Can the U.S. survive a ‘catastrophic’ power outage?

candle-in-a-blackout

Recently, the President’s National Infrastructure Advisory Council (NIAC) examined the ability of the U.S. federal government to respond to and recover from a catastrophic power outage striking a large swath of the nation. What is a catastrophic power outage? It’s a power outage longer than a few days or even weeks and that is, according […]

The FCC seeks to aggressively stem fraudulent robocalls with STIR and SHAKEN

SHAKEN-and-STIR-martini

If your recent experience is anything like mine, your phone has been pummeled by robocalls. For whatever reason, throughout the past year, I’ve been inundated with calls from across the U.S. regarding health insurance, car insurance, investment scams, mortgage refinance … you name it. On a mobile phone it’s easy to block these callers, but […]

Healthcare survey finds abundance of medical device security overconfidence

overconfident-shadow

When facing a determined adversary, it’s one thing to be confident, it’s quite another to be overconfident. But that’s what a new survey of healthcare IT professionals and biomedical engineers found: an overabundance of confidence when it comes to connected medical device security. According to the 2018 Zingbox Second Annual Connected Medical Device Survey, respondents believe […]