While the human mind is responsible for the great technological cyber achievements of storing, accessing, understanding, and protecting vast amounts of data, it also represents the greatest vulnerability placing these achievements at risk.Read More
With only weeks remaining before a US presidential election, much is being said about the leaked DNC e-mails. While the contents of these e-mails may be controversial, the questions about who perpetrated the attack, and what should be done about it, raise issues that are equally controversial and may have long-term implications.
A recent article published by Internal Auditor, focused on the need for having a collaborative and proactive approach to addressing data breaches while building resistance to future attacks.The article identified powerful facts and trends that illustrate the need for improved cyber security defenses and comprehensive policies to address the impact of successful cyber attacks.
(But not Necessarily Data Breach Frequency)
It wasn’t long ago when our attention in cybersecurity was focused on the growing sophistication and resources of well-financed, nation state sponsored, cyber attackers. Unfortunately, nothing stays the same very long in the world of cyber threats...Read More