As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position …
Technologies Pulsar

Attribution: 3 Questions to Ask When Deciding How It Matters
Attribution is often regarded as a primary goal within a cybersecurity investigation, but as John McClurg, CISO at Blackberry, explores here, conclusive attribution should at times exist as a secondary …

Better Mobile Security with a Mobile Threat Defense Plan
Why your enterprise needs a Mobile Threat Defense (MTD) in place. Today! Why your enterprise needs a Mobile Threat Defense (MTD) in place. Today!Read MoreCyber Tactics

A Framework for Measuring InfoSec as a Business Function
In my December column, I ended with the observation that many CISOs struggle when it comes to first determining and then actually communicating the business value of the security options …

Why We Need to Overcome ‘Everyday Blindness’
What is inattentional blindness, how can you overcome it and how can visual similarity/computer vision be a solution to the problem? Read More

Election Infrastructure Remains Vulnerable to Attacks
In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to …

New Year Prognostications: A Perennial Guide for the Perplexed
2020 heralds a few major shifts that will transform cybersecurity: ransomware attacks, artificial intelligence, facial recognition and mobile cybersecurity. 2020 heralds a few major shifts that will transform cybersecurity: ransomware …

Fighting Natural Disasters With AI
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments …

Expense-in-Depth: Total Cost of Controls Reconsidered
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO’s communicate the business value of this strategy? What is a Defense-in-Depth strategy, …

Vaping and Students: Enterprise Security Needs to Lead the Charge
For years, manufacturers have been finding ways to make products more appealing to kids, either by design or through the senses (i.e. smell, taste). Read More

Have You Chosen the Right Person to Lead Your SOC?
Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the …

How Different Personality Types Affect Cybercrime
How are different kinds of cybersecurity errors more common among people with certain personality preferences?Read More