Groundhog Day in the Application Security World
I am also the editor of the Neohapsis Labs blog. The following is reprinted with permission from http://labs.neohapsis.com/ By Michael Pearce, a Security Consultant and Researcher at Neohapsis...
View ArticleAnonymous Tactics (from the attacks reported on by Imperva)
I am also the editor of the Neohapsis Labs blog. The following is reprinted with permission from http://labs.neohapsis.com/ by J. Schumacher Security professionals have been following the collective of...
View ArticleGRC is not about Risk or Compliance
In my earlier post, “Security is Not the Point,” I explained why to most people security is an annoying layer of cost and inconvenience. I said that no one wants security, they want the benefits of...
View ArticleYour CISO will soon need more clout
If consumers weren’t skittish enough, Home Depot recently joined the rapidly lengthening list of big box retailers experiencing sometimes prolonged data breaches: Albertson’s, Dairy Queen, The UPS...
View ArticleAvoid the ROI trap
When legendary former Gartner analyst, Vic Wheatman, and I discussed our latest webinar, we tackled the issue of creating and measuring value. After the webinar ended, my wheels kept turning as I...
View ArticleFamed security adviser, Steve Hunt explains, “Why I Hate Security.”
Famed security adviser, Steve Hunt explains, “Why I Hate Security.” These criticisms of cybersecurity and risk management are nothing new. You’ve heard them all before, or muttered them under our...
View ArticleAn Unbreakable Internet of Things
I don’t read every press release that comes down the wire. But when I see one from a cyber security company called Secret Double Octopus–no lie–I take notice. “Secret Double Octopus. This has gotta be...
View Article
More Pages to Explore .....