How Cyber Attackers Know What You Did Last Summer

Why social engineering techniques used by cyber attackers are so effective...

I Know What You Did Last Summer is a 1997 American slasher film based on the 1973 novel of the same name by Lois Duncan. This was a very good yet creepy movie to say the least. You may be asking yourself what does this have to do with cybersecurity?

Well, there are a lot of creepy people out in the cyber world lurking the Internet and looking for information about you, like what you did last summer, for the purposes of identity theft or access to your critical corporate business assets. It’s called social engineering.

Change the World…and Your Security Posture

A surprising source of inspiration for security professionals...

Last May I was inspired by the University of Texas at Austin 2014 Commencement Address, “Change the World,” given by Admiral William H. McRaven. Inspired by Navy SEAL training, Admiral McRaven’s is on point and offers some incredible life and business lessons.

If your organization takes to heart and applies these guiding principles, I can assure you that your approach to information security and risk management will have new purpose.

So, start 2015 on the right foot and change the world, or at least better your security posture.

The Security Audit: Moving Beyond the Checklist

The right questions can help make sure security is in your company's DNA...

We’re all busy running at 100 miles per hour and the daily project task list keeps growing. Staring you in the face in the midst of the chaos is the dreaded annual security audit. Wait! What? It’s here already?

Yep. Time to get out that ole annual auditor checklist and start checking some boxes:

CISOs, ‘It’s Not Complicated’

Too many executives still see information security as a technical problem and believe that simply buying the right security widget will cause the problem to go away...

The "It's Not Complicated" campaign from AT&T has produced some of the best TV advertisements I have seen in quite some time. I would love to do a similar advertisement campaign and gather some CISOs around a table and ask, “Who thinks more is better than less?” and have a CISO respond by saying more is better than less because we want more! We like it, so we want more!

Pop Quiz: How Well Do You Know Your Vendors?

A look at some recent data breaches where attackers entered via a third party...

Pop Quiz: How Well Do You Know Your Vendors?

Do you have one, 100, 1,000, 10,000 or more vendors? Do any of them process, store and transmit your sensitive data?  Are they taking the same precautions with your data that you do?

These are great questions and ones that too often are difficult to answer. That’s because many organizations have no visibility into their vendor ecosystem, let alone visibility into contractors and sub-contractors.

WWT Security Director Talks Cyber Threats Ahead of Info Sec Nashville

Mario Balakgie, director of WWT's National Security Practice, shares his thoughts on how organizations can defend themselves against cyber attacks.

More than 500 IT and security professionals will meet at Info Sec Nashville Sept. 25 to learn about the latest trends in cybersecurity. Among presenters at Info Sec Nashville is Mario Balakgie, World Wide Technology’s (WWT) National Security Practice Director, who will lead a breakout session on infrastructure threats and response. In advance of Info Sec Nashville, Balakgie shared his thoughts on how organizations can defend themselves against cyber attacks in a podcast from TechnologyAdvice.

What Will the Cyber Breach Be Today?

It doesn't matter which news source you subscribe to, it seems like every day the news is reporting there has been a here to read more...

One of the books I used to read to my youngest son was What Will the Weather Be Like Today? The book rhymed and was fun to read. Now, I often find myself asking, “What will the cyber breach be today?”

It doesn’t matter if it’s CNBC, The Wall Street Journal or various other news sources, it seems like every day the news is reporting there has been a breach.

WWT Prepares National Guard for Cyber Attacks

WWT recently assisted Colorado and four other National Guard units with cyber defense scenarios. Read more...

With the threat of cyber attacks against state and utilities assets on the rise, the National Guard has been rapidly forging their Cyber Network Operations (CNO) and Cyber Network Defense (CND) capabilities to protect our nation’s critical infrastructure.

ISE Helps Achieve at Least Half of SANS 20 Critical Security Controls

ISE Helps Achieve at Least Half of SANS 20 Critical Security here to read more...

RSA NetWitness: An Anatomy of an Attack

According to WWT Security Architect, Aamir Lakhani, RSA NetWitness offers a real time view of threatening events on your network, and if you miss something in the moment, you can go back and review every detail of an more