New version of Cerber ransomware hits businesses where it hurts

The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to […]

Full Details

The Economics of Extortion: Understanding the ransomware market

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

Full Details

Preparing Your Storage Environment for Tomorrow’s Opportunities

Businesses today can’t exist without data. They feed on it, breathe it, and those that understand how to most effectively […]

Full Details

Preserving Value in Designing Lasting Storage Solutions

Storage solutions make or break the systems they support and yet these same systems are routinely seen as a cost […]

Full Details

Investigating the negative SEO threat

I was talking to Mark Schaefer and he said that SEO content today is about insight rather than quality.  This […]

Full Details

Not caring or not wanting to care

Last week I was walking down the street with a friend and a guy and a girl yelled over to […]

Full Details

Is your culture interfering with data security?

With the ease and prevalence of global expansion, security leaders must understand how to implement security across a global organization […]

Full Details

Successful companies use security metrics

Successful security leaders demonstrate their effectiveness through metrics. Metrics are used more and more as security executives emulate the way […]

Full Details

The case for consistency in security

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

Full Details

How to Promote Cybersecurity without using Fear

We’ve seen quite a variety of online threats recently. A simple email containing a convincing subject line can compromise a […]

Full Details

Companies with Virtual CSOs get ahead without losing an arm and a leg

Security remains a complex discipline.  This ever-changing challenge grows in complexity daily as new threats emerge and compliance requirements increase.  […]

Full Details

Culture change through incident response

An organization’s security culture in relation to information security determines how receptive employees will be to security initiatives.  Culture can […]

Full Details

Immunize your Business

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”  Bots […]

Full Details

Concerning Data Breach News for Small Businesses

A recent survey of small business owners showed that while 77 percent believe that security is important for their company’s […]

Full Details

The value of your vulnerabilities

A few months ago I discussed the sale of zero-day exploits. The Zero-day exploit trade is a new market; increasingly […]

Full Details

Developing a Security Oriented Corporate Culture

  Managing the security of an organization can be quite confusing. It can seem like an uphill battle when basic […]

Full Details

What is the real cost of a breach?

If you had a breach of your most sensitive data tomorrow, how much would it cost you?  There are quite […]

Full Details

Monetizing vulnerabilities

The phrase “Knowledge is power” has never before become so clear and scary.  The knowledge that is kept secret can […]

Full Details

Environmentally Conscious Security: Painting Information Security Green

Historically, ecological concerns have been significant drivers for change.  Topics ranging from global warming to protecting various species carry a […]

Full Details

Security Focus at the Corporate Board Level

Imagine a boardroom a generation ago.  Smoke fills the air, and sidebar discussions thrive while the board members wait for […]

Full Details

LulzSec Security Awareness Tipping Point

Bob set down the phone with a sigh. After six hours, five phone calls, countless emails, and two meetings, it […]

Full Details

The Social Networking Security Threat

Social Networking is a godsend and concern, a help and a hindrance, an amazing feat and a terrible nuisance. While […]

Full Details

Mitigating the Threat of Corporate Espionage

Corporate espionage is not just a plot for action movies; it is a real threat to small and large businesses.  […]

Full Details

The Motivation Mix: Different Strategies for Fostering Positive Security

For cybersecurity teams to achieve their goal of securing information and systems, they must motivate their staff.  Motivation is what […]

Full Details

Techniques for Motivating Secure Behaviors

The problem of motivating employees to do the right thing in security is an increasingly hard one.  Many companies have […]

Full Details

4 Generic Strategies for Competing in Foreign Markets

Four crucial generic strategic options for competing in foreign markets include export strategies, licensing strategies, franchising strategies, and strategic alliances.  […]

Full Details

The Five-forces Model of Competition

Porter’s five-forces model of competition is useful for determining the nature and intensity of an industry’s competition.  Competitive pressures exist […]

Full Details

5 Essential Tasks of Strategic Management

Companies need to think strategically in order to survive and thrive in this highly-competitive world.  There are five essential tasks […]

Full Details

Introducing the SWOT Analysis

The SWOT (Strengths, Weaknesses, Opportunities, & Threats) analysis gives managers information on whether the company is strong or weak.  As […]

Full Details

4 Tools for Managerial Success

These four tools can help managers better do their job.  In this blog, I want to briefly cover strategic group […]

Full Details

Information Security Motivation

Information security seems like more of a human problem than a technological one.  Certainly, we spend a lot of time […]

Full Details

Human Resource Bounty Hunters

As we have learned in our text, Recruiting is one of the activities of the human resource department and is […]

Full Details

Steve Jobs as a rebel or revolutionary

Steve Jobs has been instrumental in the evolution of the computer as we know it today.  Steve Jobs co-founded Apple […]

Full Details