4 Tips for Involving Legal Counsel in Cyber Security Investigations

Most companies recognize that a cyber attack will require the company to engage outside counsel. But, do you know what that engagement should encompass, what role outside counsel should play, or what benefits can be gained by managing the relationship effectively? Trust me – you do not want to discover the answers to these questions […]

Read more

What does the Anthem breach mean for you?

In early February 2015, Anthem, Inc. reported that on January 29, 2015, it had discovered that it was the target of “a very sophisticated external cyber attack.” Anthem believes the attack happened over the course of several weeks, starting on December 10, 2014. Accessed information may have included the names, dates of birth, social security […]

Read more

DoD likes efficiency of the cloud, wants more security

A recent article from C4ISR & Networks noted that while the Department of Defense wants to take advantage of the flexibility and efficiency of commercial cloud computing, the agency harbors concerns about the security of cloud environments.  James Ryan, president of Litmus Logic and chief strategy officer for the Cyber Security Summit, told the site that moving into […]

Read more

Cyber Security Summit Chair discusses securing your infrastructure

Andrew Borene, chair of the 2015 Cyber Security Summit, spoke about securing your company’s infrastructure yesterday at an event hosted by The Center for National Policy and The Christian Science Monitor. You can view his full comments below. Borene is federal chief strategist at IBM for i2 Intelligence Analysis. You can read more on his presentation from the Christian Science Monitor: Transforming overwhelming […]

Read more

President Obama delivers cyber security remarks at Stanford

Earlier today, President Obama delivered remarks at the Cybersecurity and Consumer Protection Summit at Stanford University. During his speech, he also signed an executive order promoting information sharing on cyber security threats between the private sector and government agencies. “This is not a Democratic issue, or a Republican issue,” he said during his speech. “This is not a […]

Read more

Obama to discuss cyber plans

  In our increasingly connected world, the reality of dangerous cyber threats is intensifying, and the U.S. government plans to take action. According to a release from The White House’s Office of the Press Secretary, President Obama wants to build upon steps he has already taken — including his BuySecure initiative, launched last year — […]

Read more

Report: More than 88 percent of cloud apps not enterprise ready

Compromised credentials are frequently being used in enterprise cloud apps, putting sensitive business information at risk, according to a report released today by cloud app analytics company Netskope. The report says as many as 15 percent of corporate users have had their account credentials stolen. Since many users reuse the same credentials across multiple accounts, […]

Read more

IBM study shows fewer, but more efficient, cyber attacks in 2014

The number of cyber attacks against U.S. retailers dropped 50 percent in 2014, but the increasing sophistication and efficiency of the attacks kept the number of records stolen near record levels, according to findings released yesterday by IBM. IBM’s research shows attackers obtained more than 61 million records in 2014. That represents a decrease from […]

Read more

FBI seeks special agents with cyber skills to combat online crime

After a slew of cyber attacks in 2014, the FBI has taken notice and is seeking out experienced cyber professionals to join their team, according to a report in the Chicago Tribune last week. The job post lists a variety of potential assignments, including investigations of cyber-based terrorism, computer intrusions, online exploitation and major cyber […]

Read more

Interview With our Keynote

Do not miss this exclusive interview with our Keynote Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI. Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Dramatically maintain clicks-and-mortar solutions without functional solutions. Completely synergize […]

Read more

Interview With our Keynote

Do not miss this exclusive interview with our Keynote Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Dramatically visualize customer directed convergence without revolutionary ROI. Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Dramatically maintain clicks-and-mortar solutions without functional solutions. Completely synergize […]

Read more