Will Nations Make an Effort to Establish Cyber Warfare Rules?

Will Nations Make an Effort to Establish Cyber Warfare Rules?

Years ago, most developed nations agreed to establish and follow a basic rule set when it comes to warfare: no chemical weapons, no torture, and no civilian targets. However, as tactics have turned from the battlefield to the digital plane, no such boundaries exist in cyber space. In February of this year, Antonio Guterres, Secretary of the United Nations, put out a call for the development of cyber warfare rules. But with many countries failing to even acknowledge their part in digital attacks, is the establishment of cyber warfare guidelines a pie-in-the-sky idea?

Read More

5 Ways to Improve Your Cybersecurity Posture in 2019

5 Ways to Improve Your Cybersecurity Posture in 2019

On average, a ransomware attack costs a company $5 million, resulting in system downtime and productivity loss. There has also been a noticeable increase in the reach of compliance requirements. With the cost of cyber-attacks skyrocketing, it’s critical to re-examine how cybersecurity resources are being allocated. These 2019 trends build upon classic security best practices with a focus on next-generation implementation, adoption, and technologies.

Read More

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

Components of Cyber Resilience Part 3: Thinking Beyond Risk Management

In our two previous posts on cyber resilience (CR)—how you manage operational risk and protect your assets—we explored how a holistic approach is best practice for a security-minded organization. Continuing to build on that knowledge foundation, this third part in the series explores risk management, external dependencies management, training and situational awareness.

Read More

Components of Cyber Resilience Part 2: Thinking Beyond Vulnerability Management

Components of Cyber Resilience Part 2: Thinking Beyond Vulnerability Management

Cyber resilience (CR)—how you manage operational risk and protect your assets—is, or should be, the goal of every security-minded organization. Building on our previous CR post, let’s explore additional tenets of CR, including vulnerability, incident, and service continuity management.

Read More