Blog

Are Your IT Assets Being Disposed of Securely?

 

Everybody talks about the proliferation of desktop and mobile devices and various Internet-connected objects, including medical monitors and industrial and manufacturing equipment. Everybody talks about the enormous volume of data that is constantly being generated and...

The Role of Incident Response in Effective Cybersecurity

A data breach is a costly event. As I noted in my last post, shipping firm Maersk fell victim to a NetPetya malware attack that brought estimated revenue losses of $200 million to $300 million during two weeks of business disruption. That’s many times the $3.62 million average...

Maersk Attack Illustrates the Enormous Cost of Downtime

In a previous post, I discussed the dangers of “aftershock” attacks as organizations continue to feel the impact of the WannaCry ransomware attack. Microsoft issued an emergency patch for the exploit behind WannaCry, but the malware continues to impact PCs and servers running...

Why ‘Aftershock’ Attacks May Bring More Tears than WannaCry

LG recently confirmed that some of its self-service kiosks in South Korea were infected with WannaCry, forcing the consumer electronics manufacturer to shut down some of its systems to prevent further spread of the malware. It’s the latest outbreak of the worst ransomware...

Why Security Is Critical to the Success of the Internet of Things

In my last post, I discussed the shared responsibility model of cloud computing, and why organizations must take steps to protect the applications and data that they move to public cloud platforms. Cloud providers are only responsible for securing their infrastructure — not...

Who’s Responsible for the Security of Data in the Cloud?

On June 8, 2017, security researchers discovered a data repository on the Amazon Simple Storage Service (S3) that could be accessed by anyone on the Internet. The repository contained the names, addresses, account details and personal identification numbers (PINs) of up to 14...

Consolidated Billing Helps Optimize the Cloud Spend

Back in 2009, the National Institute of Standards and Technology (NIST) drafted a formal definition of cloud computing. The definition states that the cloud has certain essential characteristics, including on-demand self-service, broad access, resource pooling and rapid...

The Growing Cybersecurity Threat to Medical Devices

It’s chilling to think that a heart monitor, blood gas analyzer or MRI scanner could be infected with malware, but the threat is very real. Malware called MEDJACK (short for “medical device hijack”) was recently found on equipment at 10 U.K. hospitals.

First discovered in...

Cybersecurity Must Be a High Priority for K-12 Schools

Like businesses large and small, K-12 schools are relying heavily upon technology for their day-to-day operations. In the classroom, teachers are using a wide range of rich media curricula, and printed textbooks are being replaced by electronic versions. Tests are increasingly...