Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching the really dangerous, hidden threats before they can strike.
A survey of federal IT and security personnel shows that a lack of money and skilled workers are the biggest impediments to security, and careless insiders represent the greatest threat. Doing more with less is not the answer; if leaders are serious about IT security they must put the money where the collective mouth is.
Unfortunately, we don’t yet have technology that can prevent a storm of the magnitude of Hurricane Harvey from devastating our cities and towns. But it can help in the response, and even provide valuable information for citizens trying to survive a catastrophic event.
If Brazilian Jiu-Jitsu (BJJ) teaches you anything, it’s how out-of-shape you are. After every class, I feel like a tub of butter poured on a bed of uncooked cookie dough. It’s supposedly part of the transformation efforts that takes place as you gain the endurance and prerequisite muscle needed to complete classes. After class, I … Continue reading Shrimping Out in Life: Tips for Approaching Brazilian Jiu-Jitsu
The latest revision of NIST’s catalog of security and privacy controls (SP800-53) addresses the challenges to both the public and private sectors of an increasingly interconnected information infrastructure that includes industrial control systems and the Internet of Things.
The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.
SecBI has fielded new software that aims to eliminate the burden of processing billions of traffic logs per month manually, and they did it without using any network taps. Come to CSO Magazine to find out how SecBI solved this tricky problem in an exclusive review of the new product.
The night before my son was released from the hospital, I dropped by and signed-up for a three-day tryout. I was hooked after my first class.
A contract has been awarded for a multi-billion dollar dedicated public safety network, which is supposed to be up and running within five years. But coverage, reliability and security remain challenges for the ambitious project.