Our top industry experts weigh in on topics that could affect you and your organization

  • Tips on building a high-performance Security Team

    Posted on May 21, 2019 by John McDonald

    As the attack surface grows for Cybersecurity, if your IT Team is unable to keep up with the risks, there is more at stake than the success of your business. Did you know that these days IT Teams risk their mental health worrying about network security? In this blogpost, see how to build a happy high-performing Security Team. Learn More
  • Knowledge from the field: Steps to secure IoT products

    Posted on May 8, 2019 by Charles Worrell

    At our test lab for wireless products, we hear all kinds of testing showstoppers.  This is one of them:  sometimes we meet device manufacturers who have not taken into account the need to do security testing on their products until after they are fully designed and engineered to be produced. This oversight often results in unexpected and costly delays in getting a product to market. Learn More

  • How to conduct a self-assessment to find gaps in your Cybersecurity framework

    Posted on April 17, 2019 by Kevin Moker

    The first part of any problem is knowing that there is a problem. One technique to identify problems in the information security space is with the use of a NIST CSF assessment. What is the NIST Cybersecurity Framework? According to the National Institute of Standards and Technology (NIST), the Cybersecurity Framework (NIST CSF) is a “voluntary Framework that consists of standards, guidelines, and best practices to manage cybersecurity-related risk. Learn More

  • Ready for ransomware? An executive perspective

    Posted on January 29, 2019 by John McDonald

    An old client was calling. His new employer had been hit with ransomware. Applications were down across their network, with servers encrypted. Active Directory was not responding; even laptops were dead. My client was calling for help. He was calling everyone for help—his old contacts, consulting firms, value-added resellers, vendors—everyone with whom he had relationships. Learn More

  • What to Do When Automated Application Security Testing Falls Short

    Posted on August 24, 2018 by Seth Art and Josh Belles

    As the number of applications developed explodes, the prospect of performing Application Penetration Testing on each application, with limited budgets and scarce resources, becomes increasingly daunting and seemingly impossible. Application risks will never be sufficiently mitigated by relying on automated scanning alone. Typically, there are three main dynamic options practiced today, and they vary in coverage, accuracy, and cost. Learn More

  • The Myth of the Operational Technology Air Gap

    Posted on August 2, 2018 by Nigel Stanley

    The cybersecurity field of operational technology (OT) is buzzing as companies increasingly realize that their production systems, manufacturing plants, chemical processing plants or industrial control systems are at risk from cyber-attacks. This realization is fuelled by a big uptick in hacker interest as such systems are insecurely connected to the internet and compromising them is a change from stealing credit card information. Learn More

Before you leave…
want to sign up for our newsletter?