8 Cybersecurity Trends to Watch for in 2018

By Michelle Drolet . 12 Dec 2017

New challenges and threats will face IT departments in the year ahead. As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll … Continue reading 8 Cybersecurity Trends to Watch for in 2018

Can machine learning be used to shore up cyber defenses?

By Michelle Drolet . 27 Nov 2017

Deep learning can be a vital supplementary tool for cybersecurity. The meteoric rise of malware has put us all at risk. We are engaged in a never-ending race with cybercriminals to protect systems, plug gaps, and eradicate vulnerabilities before they can gain access. The front line grows by the day as we share more data and employ … Continue reading Can machine learning be used to shore up cyber defenses?

Cyberattack    

The Darwin defense: can ‘genetic algorithms’ outsmart malware?

By Michelle Drolet . 17 Nov 2017

Coming to a future near you: software code that mutates and evolves. We often talk about computer systems and information security in biological terms. Threats and defenses evolve, viruses run rampant, and machines learn by emulating the neural networks in our brains. Cybersecurity is an endless war between attackers and defenders, just as biology is … Continue reading The Darwin defense: can ‘genetic algorithms’ outsmart malware?

5 questions to ask your CEO about cybersecurity

By Michelle Drolet . 31 Oct 2017

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to … Continue reading 5 questions to ask your CEO about cybersecurity

Making a bad situation worse: how Equifax mishandled the breach

By Michelle Drolet . 28 Sep 2017

Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not. There have been some very high-profile data breaches in the last few years, but the latest disaster to hit the headlines concerns one of the largest credit bureaus in the United States. It’s estimated that the Equifax data breach exposed 143 million consumers, with … Continue reading Making a bad situation worse: how Equifax mishandled the breach

Build it right with NIST’s Cybersecurity Framework

By Michelle Drolet . 13 Sep 2017

Diving into NIST Special Publication 800-53 for practical advice. We’ve already laid out a broad overview of what NIST’s cybersecurity framework can do for you, so today we’re going to drill into Special Publication 800-53. Published by the National Institute of Standards and Technology, and based on important research from the Information Technology Laboratory, this publication offers … Continue reading Build it right with NIST’s Cybersecurity Framework

What NIST’s Cybersecurity Framework is and why it matters

By Michelle Drolet . 17 Aug 2017

Practical advice to help you build a solid InfoSec plan The risk of your business falling victim to cybercrime has never been higher. Despite a seemingly endless parade of high profile data breaches, ransomware attacks, and phishing scams, many organizations still lack the necessary defenses to identify, prevent, or recover from an attack. The trouble … Continue reading What NIST’s Cybersecurity Framework is and why it matters

10 things I know about… Public Wi-Fi

By Michelle Drolet . 2 May 2017

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers. 9. Sign me up By default, most mobile phones/devices are set to ask your permission to join a network. Once you obtain credentials, the known network will join your phone automatically. 8. Sniffing … Continue reading 10 things I know about… Public Wi-Fi

6 Ways to Launch a Targeted Cyberattack

By Michelle Drolet . 14 Feb 2017

What you need to know to defend against targeted attacks. The threat of a targeted attack for any business is real and substantial. It’s vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe. Consider that, on average, attackers are … Continue reading 6 Ways to Launch a Targeted Cyberattack

Michelle Drolet Talks to tED Magazine about How Companies Can Prepare for a Security Breach

By Michelle Drolet . 4 Jan 2017

Our own Michelle Drolet sits down with tED Magazine to discuss what security measures companies can take to protect their data. Read the full article >    

Tags