<img src="http://www.66infra-strat.com/79881.png" style="display:none;">

How to Reduce Your Cyber-Attack Surface Before It's Too Late

Has your attack surface increased as you've moved more workloads to the cloud? While moving to the cloud can be a great idea, it can also be a security headache for IT departments who have not increased their security staff to keep up with the demand. All it takes is one data breach to put your organization at risk and endanger the value that moving to cloud brings.

What will Software Defined Perimeter Mean for Compliance?

Your network isn't really your network anymore. More specifically, the things you thought of as your network — the boxes with blinking lights, the antennae, the switches, the miles of Cat 5 cable — no longer represent the physical reality of your network in the way that they once did.

Equifax Demonstrates All the Wrong Ways to Respond to a Data Breach 

Normally, when a company gets hacked, they're entitled to a certain amount of sympathy. Advanced malware is difficult to defend against, and the best that companies can do is sometimes not enough. Equifax, on the other hand, has decided that the aftermath of a devastating cyberattack is the best time to act like a morally-compromised bully. Reacting to the loss of personally identifying information (PII) for over 140 million Americans, their response has been entirely inadequate.

Understanding the new Cloud Security Guidance from the CSA

At this year's Black Hat conference in July, the Cloud Security Alliance (CSA) announced new guidelines for enterprises to create secure public and private cloud computing architectures. The last time this update occurred was in 2011, which means that this update incorporates over half a decade of technological advancement. There is a significant new body of work in Guidance for Critical Areas of Focus in Cloud Computing 4.0 , and its implications will reverberate.

Will Platform Consolidation Dismantle Your Security Solutions?

The most logical step, following proliferation, is consolidation. This is a trend that we've seen in nearly every other industry after periods of intense innovation, and it's a trend that we're seeing now in information security.

NotPetya caused Maersk to lose Hundreds of Millions in US dollars

The world’s largest container ship and supply vessel operator, Maersk, announced last week that it has suffered hundreds of millions in U.S. dollar losses from the ransomware attack, “ NotPetya ”. 

Why the Sun (Data) in Your Enterprise Craves A Total Solar Eclipse (Attack Surface Reduction)

On August 21st, something groundbreaking happened- Netflix viewership went down by 10%... that’s about 5 million accounts.

Secure Data Access and the GDPR

Unless something happens between now and May 2018, the largest fine assessed for negligent cyber-protection in the EU prior to the implementation of the General Data Protection Regulation (GDPR) will have gone to a company called TalkTalk. The UK telecom firm had received warnings that two of its web applications were vulnerable to cyberattack, ignored those warnings, and then 157,000 of its customers had their data stolen.

How Secure Data Exchange Will Let Companies Comply with the GDPR

Over the past couple of weeks,  we've talked a great deal about the General Data Protection Regulation (GDPR) that will take hold in the European Union next May. We've spoken about:

Everything You Need to Know About the Swedish Data Leak

Nothing is more scarring than the possibility of having your personal data fall into the wrong hands. The impact seems even more callous when the cause behind the breach is not a malicious virus, or a mystery hacker from a far away land, but rather from an oversight by an institution that you’d think would be good at following its own laws- The Government.

 

Subscribe to Email Updates