This post was also featured on Cisco’s website here. While there are a number of ways to err during the course of responding to an incident, it never seems to fail
IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the
I didn’t want to bring him this information, because I knew how quickly the conversation would go sideways, but I was required to do so… “We have an incident on
I’ve attended one or two talks in the past on Gamification and honestly never thought much of it, until I saw it in action at a vendor booth at RSA.
“Table Top Exercises” (TTX) has become part of my almost daily vocabulary given how hot the demand for them has become. From the companies and individuals I spoke with, there
With the continued news of breach after breach, a lot has been made about having a Security Operations Center (SOC) to monitor alerts coming in from your security investments. Realistically,
In keeping up with the Anthem Healthcare breach, I began to cringe when I saw comments stating things such as, “our children will be impacted for years to come”, or,
Recently I made tossed my hat into the ring to provide some commentary on Obama’s cybersecurity proposal and it somehow made itself into a Wall Street Journal mention. I was humbled to say
Unless you’re still hung-over from the holidays, you most likely saw the news regarding President Obama pitching cyber reform. While I applaud the idea at a high level, especially around
We live in a different world than the one we lived in years ago. Most security professionals were content to have time to play with some logs, install a