Will VENOM’s strike poison your shared infrastructure?

Will VENOM’s strike poison your shared infrastructure? May 20, 2015

by David Burg and Joe Nocera. The fangs of a newly-found security vulnerability in virtual computing systems were revealed by security researchers at CrowdStrike last week. Named “VENOM” its announcement calls attention to a previously unrecognized risk that may impact millions of systems around the world, as well as disrupt normal business as IT organizations […]

Read the full article →

ISAOs: A Leap Forward

ISAOs: A Leap Forward April 22, 2015

By Dave Burg. Information Sharing and Analysis Organizations (ISAOs) have the potential to energize the flow of cyber intelligence among federal agencies and between the private and public sectors. President Obama signed an executive order to spur the creation and use of ISAOs back in February – and on Monday, we convened a follow on […]

Read the full article →

A National Approach to Cybersecurity: The Next Step

A National Approach to Cybersecurity: The Next Step April 7, 2015

by Dave Burg. We’ve all read the headlines. Cybersecurity is on everyone’s mind. Consumers, patients, enterprises, shareholders and governments are all worried about cyber threats. The question I get asked again and again is: “How can we address this problem?” Both industry and the government have reached the point where they recognize the mutual advantages […]

Read the full article →

Why Obama’s executive order on cybersecurity information sharing is on the mark

Why Obama’s executive order on cybersecurity info. sharing is on the mark February 20, 2015

By David Burg. Last Friday, US President Barack Obama signed an executive order that further signifies cybersecurity information sharing is a top priority for the Obama Administration. The voluntary framework takes a strong—and necessary—stance on encouraging information sharing among industries as well as among the private sector and government agencies. I was in the audience […]

Read the full article →

Industrial products companies counter escalating security risks with solid investments in security

Industrial products companies counter escalating security risks with solid investments in security January 29, 2015

By Quentin Orr. You’d have to be living on Pluto to be unaware of the unprecedented surge in targeted cyber threats. The most recent attack demonstrates that adversaries are becoming increasingly skilled—and punishingly malevolent. Risks are rising across sectors, and industrial products companies are by no means exempt. The Global State of Information Security® Survey […]

Read the full article →

Despite prominent breaches, retail and consumer companies remain underprepared for cyber threats

Despite breaches, R&C companies remain underprepared for cyber threats January 15, 2015

By G. Christopher Hall Call it the year of the mega-breach. Over the past 12 months, attacks on retailers have climbed to epic levels, both in frequency and scope. While the most notable of these high-profile incidents occurred in the US, the trend is not limited to North America. The Global State of Information Security® […]

Read the full article →

Cybersecurity trends 2015: A tipping point?

Cybersecurity trends 2015: A tipping point? January 6, 2015

By David Burg. If 2014 was the year of the publicly viewable mega-breaches, 2015 may represent a tipping point where governments drive regulation and deliver overt support to victims of sophisticated cyberattacks. PwC’s upcoming 18th Annual Global CEO Survey, found CEO concern over cyberthreats had the most dramatic increase from last year, compared to other […]

Read the full article →

The prognosis for healthcare payers and providers: Rising cybersecurity risks and costs

The prognosis for healthcare payers and providers: Rising cybersecurity risks and costs December 17, 2014

By Peter Harries. The global healthcare ecosystem is evolving at lightning speed as advances like telemedicine, information sharing via smartphones and social media, and sensor-based connected devices proliferate. At the same time, healthcare payers and providers are forming new partnerships with a broadening constellation of care collaborators to offer new services and products. Taken together, these […]

Read the full article →

It’s time to improve cybersecurity for networked medical devices

It’s time to improve cybersecurity for networked medical devices December 11, 2014

by Mick Coady and Geoff Fisher.  Editor’s note: This is the first in a five-part series of blog posts exploring cybersecurity issues and solutions for networked medical devices. Connected medical devices are transforming how health organizations deliver care and monitor patient health, both in provider facilities and in individual homes. Networked equipment like drug-infusion pumps, […]

Read the full article →

Beyond the survey numbers: Panelists discuss real-world cybersecurity issues

Beyond the survey numbers: Panelists discuss real-world cybersecurity issues December 3, 2014

By Mark Lobel. In The Global State of Information Security® Survey 2015, we delivered the numbers that describe the current condition of security. The findings do not inspire great confidence for today, but they do provide guidelines on what organizations can do to improve cybersecurity for the future. I have shepherded this survey since 1998, […]

Read the full article →