Protect Your Organization with SOAR

[fa icon='calendar'] May 22, 2018 10:00:00 AM / by Stan Blanton

[fa icon="comment"] 0 Comments

The IDS (Intrusion Detection System) has been around for several decades. We believe there is still much room for growth. In no way am I criticizing the researchers or vendors who build an IDS - I am merely going to acknowledge the difficulties involved.

Read More [fa icon="long-arrow-right"]

Insights Into Cyber Security for Restaurants & Retail

[fa icon='calendar'] Mar 13, 2018 11:46:40 AM / by Eraj Akhtar posted in MainStreet USA, MME, Mid Market Enterprise, compliance, Cybersecurity requirements

[fa icon="comment"] 0 Comments

Guide to Navigating Retail Related Defense 

Read More [fa icon="long-arrow-right"]

IP and Data Anonymization 

[fa icon='calendar'] Mar 7, 2018 9:39:02 AM / by Rob Scholl CISO @RISK posted in Insider, Cyber attack surface, polymorphic, Cyber Event

[fa icon="comment"] 0 Comments

Protecting your privacy: Anomymization the good & bad.

IP Anonymization is good, and bad - let's learn why.

Read More [fa icon="long-arrow-right"]

Privacy by Design, GDPR Compliance and You

[fa icon='calendar'] Aug 24, 2017 9:27:18 AM / by John Bliss posted in Privacy by design, compliance, Cybersecurity requirements

[fa icon="comment"] 0 Comments

The EU's General Data Protection Regulation (GDPR) has seen data protection driven up on the agenda at banks and insurance providers. Data privacy regulation has moved from a reactive to a proactive emphasis. “Businesses are now scrambling to put in processes and technology so they can care for any personal identifiable information appropriately, and be seen as taking data security seriously or risk punitive punishment.  The impacts of GDPR are felt not only by banks and other financial services companies, but also by the broader ecosystem that encompasses third-party vendors and partners who will also feel the impact of the regulation.

Read More [fa icon="long-arrow-right"]

Consensus Theory Machine Learning reduces "Cyber Ghostbuster" Missions

[fa icon='calendar'] Aug 20, 2017 2:06:23 PM / by Rob Scholl CISO @RISK posted in Cyber attack surface, Privacy by design, MainStreet USA, MME, Cybersecurity requirements

[fa icon="comment"] 1 Comment

As a CISO, my challenge has been to reduce the number of alerts by filtering out the noise generated by a myriad of data sources.  I have to balance the latest "good idea" checklists and frameworks with the budget and staff that I have already.  As an Information Security expert, I have discovered that it is costly both financially and organizationally in staff morale to constantly having to conduct "Ghostbuster" missions that end like bad comedy through chasing ghosts in a machine that alerts us constantly and points us to a dead end.

Read More [fa icon="long-arrow-right"]