Organizations across America are facing unprecedented challenges in building effective, manageable security programs in order to protect the wide array of sensitive data they are responsible for keeping safe.
Cyber insurance purchases are on the rise. According to Marsh’s 2016 Cyber Benchmarking Trendsreport, there was a 27-percent increase in the number of U.S. clients purchasing standalone cyber coverage for the first time in 2015.
It looks like 2016 is set to be the year when Information Security gets serious. This year is predicted to break records in terms of investment in cybersecurity measures, with organizations predicted to allocate nearly nine percent of their entire IT budget to security.
When students and staff at the Coast Guard Academy needed their laptops and mobile phones repaired, they called Larry Mathews. For over a decade, Mathews owned the local computer repair shop. Then he pleaded guilty to computer intrusion.
When discussing cybersecurity, a color can make all the difference. I recently spoke with Christopher Camejo, Director of Threat and Vulnerability Analysis, for NTT Com Security, about the differences between a white hacker, blue hacker and black hacker, and a red penetration test.