Why social engineering techniques used by cyber attackers are so effective...
I Know What You Did Last Summer is a 1997 American slasher film based on the 1973 novel of the same name by Lois Duncan. This was a very good yet creepy movie to say the least. You may be asking yourself what does this have to do with cybersecurity?
Well, there are a lot of creepy people out in the cyber world lurking the Internet and looking for information about you, like what you did last summer, for the purposes of identity theft or access to your critical corporate business assets. It’s called social engineering.
A surprising source of inspiration for security professionals...
Last May I was inspired by the University of Texas at Austin 2014 Commencement Address, “Change the World,” given by Admiral William H. McRaven. Inspired by Navy SEAL training, Admiral McRaven’s is on point and offers some incredible life and business lessons.
If your organization takes to heart and applies these guiding principles, I can assure you that your approach to information security and risk management will have new purpose.
So, start 2015 on the right foot and change the world, or at least better your security posture.
The right questions can help make sure security is in your company's DNA...
We’re all busy running at 100 miles per hour and the daily project task list keeps growing. Staring you in the face in the midst of the chaos is the dreaded annual security audit. Wait! What? It’s here already?
Yep. Time to get out that ole annual auditor checklist and start checking some boxes:
Too many executives still see information security as a technical problem and believe that simply buying the right security widget will cause the problem to go away...
The "It's Not Complicated" campaign from AT&T has produced some of the best TV advertisements I have seen in quite some time. I would love to do a similar advertisement campaign and gather some CISOs around a table and ask, “Who thinks more is better than less?” and have a CISO respond by saying more is better than less because we want more! We like it, so we want more!
A look at some recent data breaches where attackers entered via a third party...
Pop Quiz: How Well Do You Know Your Vendors?
Do you have one, 100, 1,000, 10,000 or more vendors? Do any of them process, store and transmit your sensitive data? Are they taking the same precautions with your data that you do?
These are great questions and ones that too often are difficult to answer. That’s because many organizations have no visibility into their vendor ecosystem, let alone visibility into contractors and sub-contractors.
Mario Balakgie, director of WWT's National Security Practice, shares his thoughts on how organizations can defend themselves against cyber attacks.
More than 500 IT and security professionals will meet at Info Sec Nashville Sept. 25 to learn about the latest trends in cybersecurity. Among presenters at Info Sec Nashville is Mario Balakgie, World Wide Technology’s (WWT) National Security Practice Director, who will lead a breakout session on infrastructure threats and response. In advance of Info Sec Nashville, Balakgie shared his thoughts on how organizations can defend themselves against cyber attacks in a podcast from TechnologyAdvice.
It doesn't matter which news source you subscribe to, it seems like every day the news is reporting there has been a breach..click here to read more...
One of the books I used to read to my youngest son was What Will the Weather Be Like Today? The book rhymed and was fun to read. Now, I often find myself asking, “What will the cyber breach be today?”
It doesn’t matter if it’s CNBC, The Wall Street Journal or various other news sources, it seems like every day the news is reporting there has been a breach.
WWT recently assisted Colorado and four other National Guard units with cyber defense scenarios. Read more...
With the threat of cyber attacks against state and utilities assets on the rise, the National Guard has been rapidly forging their Cyber Network Operations (CNO) and Cyber Network Defense (CND) capabilities to protect our nation’s critical infrastructure.