How machine learning impacts information security

O'Reilly Media - Ideas

The O’Reilly Data Show Podcast: Andrew Burt on the need to modernize data protection tools and strategies. They list important changes to the information landscape and offer suggestions on how to alleviate some of the new risks introduced by the rise of machine learning and AI.

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

A guide to modern mobile app development strategy

OTS Solutions

A guide to modern mobile app development strategy. This is informed by the fact that close to 90 percent of the population, which translates to 6 billion people, have access to mobile phones. Here is what you need to know about mobile app development strategy.

Mobile 130

Honeypot Security System Strategy


Sweeten your security strategy with a honeypot security system Implementing honeypots and honeynets as part of your network intrusion prevention/detection process We’ve all heard the old saying that you can attract more flies with honey than with vinegar.

How to Package and Price Embedded Analytics

struggle to integrate analytics into their products, business models, and pricing strategies in a way that meets a range of user. With this approach, you turn features off and on through visibility controls, conditional logic, and your application’s security model. Use this information.

Context Conversations preview: Election security

The Parallax

When it comes to election security, it’s hard not to think of the United States as a proverbial dumpster fire. And while some states are taking steps to secure their voting processes, many are not. Why current funding to secure U.S.

The best patch management strategy for 2019


How do you keep all your systems patched against the never ending onslaught of security vulnerabilities? Patch Central Security antivirus email security patch management patch strategy risk assessmentPatch management causes headaches. Just ask any IT manager or sysadmin!

The What and Why of a Unified Security Strategy

The New Stack

These days, you have no shortage of options and strategies to choose from when deploying an application. That is why it’s useful to embrace the concept of a unified security strategy. This means putting in place the tools and processes you need to secure any and all environments.

Whitelisting, blacklisting, and your security strategy: It's not either-or


Security, Information Security, Information Security (Info Sec Windows vs. Mac. AWS vs. Azure. Kubernetes vs. Swarm. If you work in IT, these are some of the big decisions you may need to make at one point or another in your career.

Azure 43

How architecture evolves into strategy

O'Reilly Media - Ideas

A look at the roles of architect and strategist, and how they help develop successful technology strategies for business. Before we do that, though, let's cover some historical context that informs how we think of the role. Adding security reduces performance.

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

Why a Reactive Security Strategy Costs Companies Millions Each Year


With each new threat, digital security companies are learning to react more quickly and put out countermeasures for these malicious programs, but in the time between a piece of malware’s release into the wild and the release of the solution, it can cost companies a staggering amount of money.

We Need A National Cybersecurity Strategy That Everyone Can Implement


In a few months we’ll have a new Administration in Washington and a chance to update our national security policies. So it’s good time to reflect on what we might want to do differently for cybersecurity. A quick search on the Internet will reveal many national cybersecurity initiatives. The quick answer is that we don’t have a national cybersecurity strategy that everyone can implement. A national cybersecurity strategy is well within our reach.

7 tips for scaling your AI strategy


Read Clint Boulton list 7 tips for companies to scale up their AI strategy on CIO : Pilot projects of artificial intelligence (AI) technologies proliferated in 2018, as many enterprises tested machine learning (ML) algorithms and an array of automation tools to cement relationships with customers, improve network operations or augment their cybersecurity postures.

Inform Your Cybersecurity Strategy With Lessons From July 1861


CTO Cyber Security Cyber War Internet of Things News smart cityWhen I was the Director of Intelligence for DoD's first joint cyber defense organization (JTF-CND) our Commander (At the time, Army Major General Dave Bryan) and our J5 (Marine LTC Mike Davis) organized a visit for the senior staff to the Manassas Battlefield Park of Virginia. The purpose was not just team building, but to [.].

A foundational strategy pattern for analysis: MECE

O'Reilly Media - Ideas

As lists are the raw material of strategy and technology architecture, MECE list-making is one of the most useful tools you can have in your tool box. MECE, pronounced "mee-see," is a tool created by the leading business strategy firm McKinsey.

Things To Do Right Now About Your Cybersecurity Workforce Crisis


Intel Security has released Hacking the Skills Shortage , a report revealing the current cybersecurity workforce crisis. The shortage in cybersecurity skills has done measurable damage to companies. Additional key findings of the survey include: 82% of respondents reported a shortage of cybersecurity skills. 9 out of 10 respondents say that cybersecurity technology could help compensate for skill shortages. Bob Gourley.

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. And not all federal cybersecurity decisions this year were necessarily harmful to consumers.

Blame Replaces Strategy: Enterprise IT War Rooms Causing Incalculable Losses

The post Blame Replaces Strategy: Enterprise IT War Rooms Causing Incalculable Losses appeared first on Blogs Enterprise DevOps IT war rooms network operations securityThe concept of a “war room” is time-honored.

How enterprise mobile apps are changing IT strategy?

OTS Solutions

How enterprise mobile apps development changing IT strategy. The post How enterprise mobile apps are changing IT strategy?

Mobile 130

Main Street Cybersecurity: 10 Cost Effective Strategies for confronting Ransomware


As we usher in the new year of 2018, we are confronted with an ever-expanding network-borne threat landscape especially from ransomware. Ransomware is a type of malicious software which is used by malicious actors to encrypt systems or data. When the ransom is paid the key is in some cases provided to unlock the data. […].

Experts on U.S. National Cyber Strategy (cont’d)

The Cipher Brief

strategy around four main pillars: the first pillar includes securing federal networks and information, securing critical infrastructure, fighting cybercrime and seeking improved incident reporting. ingenuity, and focusing on building a more robust cybersecurity workforce.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk


Cybersecurity is one of the most high-profile topics for organizations today and one of their biggest sources of risk. Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations. Why are Androids less secure than iPhones? Security theater.

Hotels 162

Hitachi Vantara’s API Strategy for The Smart Data Center

Hu's Place - HitachiVantara

I will cover our strategy for utilizing it in our products and provide some example of how it is utilized to enable the Smart Data Center. It also makes it possible to inherit security policies from an underlying transport mechanism.

Customers Need a Hyper-Converged Infrastructure For a Resilient, Adaptive Cybersecurity Strategy – Partners Can Help

Armughan Ahmad - Dell EMC

In 2017, there were more than 5,000 publicly disclosed data breaches, according to Risk-Based Security. The implementation of sweeping regulations, as well as the damaging effects of financial penalties and brand reputation, have elevated the need to protect and secure data.

Why Microservices Will Become a Core Business Strategy for Most Organizations

Dion Hinchcliffe's Web 2.0 Blog

I am now also clearly seeing from many of my CIO and IT contacts that developing a microservices strategy is rapidly becoming a key priority this year. And do it as a part of an overarching business strategy.

AI brings speed to security

O'Reilly Media - Ideas

Survey results indicate incident response times improve with AI-based security services. Twenty percent of IT professionals who rely on traditional security measures said their teams can detect a malware infection or other attack within minutes, according to the survey.

The Report The Cybersecurity Commission Should Have Sent To the President and President Elect


On 1 December The Commission on Enhancing National Cybersecurity issued their key deliverable, the report on Securing and Growing The Digital Economy. For policy-makers new to cybersecurity the introduction recaps issues the nation has been dealing with for quite some time now.

Report 111

What the Experts Say About the National Cyber Strategy

The Cipher Brief

Administration released its new National Cyber Strategy on Thursday, covering a broad number of security-related issues that fall into four main categories, it refers to as ‘pillars’. The first pillar includes securing federal networks and information, securing critical infrastructure, fighting cybercrime and seeking improved incident reporting. ingenuity, and focusing on building a more robust cybersecurity workforce. The U.S.

Internet of Things Strategy: It Will Determine Your Organization’s Future

Dion Hinchcliffe's Web 2.0 Blog

At the same time, IoT will also pose very significant infrastructure, operational, management, governance, and security challenges for most enterprises due to scale, skill shortages, build-out, and related issues. The Essential Digital Strategies.

IoT 99

Federal Strategies for the Startup CEO


One of our more popular white papers (with over 2000 downloads) is titled " Advice for the Tech Startup CEO Considering a Federal Strategy." Download “Federal Strategies for the Startup CEO” Advice-for-the-tech-startup-CEO.pdf – Downloaded 2226 times – 788 kB.

National Cyber Security Hall of Fame Announces 2015 Inductees


14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. He leads Microsoft's Security Development Lifecycle team and is responsible for its corporate strategies and policies for supply chain security and for strategies related to government security evaluation of Microsoft products.

Inform your federal growth strategy with Opptiv


For example, the cartoon below: This struck me as particularly funny since I have seen so many companies approach their new growth strategy this way. For more see: Rethink Your Growth Strategy. This is a Cognitio sponsored post, Contact Us for information on sponsoring your content.

How hybrid cloud strategy can help protect your business data


Read how having a hybrid cloud strategy can help you protect your business data on ARN Net : For many businesses, the idea of putting your business data entirely on a public cloud is an idea that’s immediately appealing in its simplicity. Cloud Computing CTO Cyber Security News

.Net 42

The Pentagon’s Cyber Strategy: What’s New and What it Means

The Cipher Brief

On Wednesday, the Department of Defense (DoD) quietly released an unclassified summary and fact sheet on its 2018 Cyber Strategy, which replaces the 2015 DoD Cyber Strategy. Here are ten things you need to know about the new strategy: Cipher Brief Level I Members can access this article via login or by signing up to become a Cipher Brief Member. Joining this high-level, security-focused community is only $10/month (for an annual $120/yr membership).

Internet Two Seeks Chief Cyberinfrastructure Security Officer


Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO reports to the Vice President for Network Services and will have responsibility for security across all Internet2 infrastructure programs. By Bob Gourley.

Microsegmentation – Secure Your Internal Network


Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC


By Bob Gourley DC seems to have a cyber security related event every week. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management.

Cyber Security in Aviation


Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.