Breach: Why Steal Medical Records?
So, that’s a good question and many of my colleagues think they have an answer and it has nothing to do with health care. What seemed to grab headlines with the hack of Community Health Systems back...
View ArticleWhat to Do After a Breach?
This is a question that Target, Home Depot, Sony Pictures Entertainment and Anthem have had to answer recently and from the evidence, it doesn’t look like any of them had a response plan in place. It...
View ArticleData Security and Analytics: The Times, they are a Changing.
As we all know, 2014 was an exciting year for data security. Every survey we’ve seen says that business and technology leaders are deeply anxious about data security in 2015. There are obviously some...
View ArticleNew Malware Attacking Small Retail Businesses
Do you own a small retail business with a Point-of-sale (PoS) system at your checkout counter and are somehow convinced you are immune from attacks like the ones that wreaked havoc at Target and Home...
View ArticleCyber-attacks No Longer Just Graffiti.
We have now arrived at a place where the nature of cyber-attacks has reached a serious level of gravity and are very different than the early days (say, back in 2011) when web servers were being...
View ArticleRowHammer, Hammer Me Some Holes.
About 100 years ago, we created a simple data archival product called ASM2 which went on to become the leading disk space management product in history. We did it by using a bit flipping technique to...
View ArticleWhat Does “Breach-Ready” Mean To You?
We spend a lot of time educating customers about the best ways to prepare for the inevitable security breach and one of the issues we repeatedly run into is most people’s interpretation of what it...
View ArticleYour Email is Not Secure.
The current flap over Hilary Clinton’s email reminds us that our email is not now nor has it ever been “secure”. Many of us forget that email as seen in our browsers displaying that https prefix to...
View ArticleSocial Engineering: The New Con Artists
In the last few months, social engineering techniques have become increasingly advanced and traditional training methods are simply not good enough to keep your company safe. Increasingly, we share...
View ArticleData Security is Often Up To You
More Evidence for Why Security is Up To You. RadioShack has put 65 million customer names, addresses and 13 million email addresses up for sale in its bankruptcy proceedings. This data is part of the...
View Article