Articles

 

  • An Intelligent Approach to Resolving IT Support Issues

    There’s been a lot of buzz in the HMG member-CIO community around an emerging company called Moveworks that’s tackling an age-old problem in IT: resolving employee support issues. In fact, many of these members happen to be Moveworks customers and they are bragging about the company’s ability to solve their support tickets autonomously.

  • HMG Tech News Digest June 21

    Trending News on Zoom's CIO Focusing on the Cyber Threat Challenge, Facebook's New Cryptocurrency, 5G Smart Phones Posing Potential Health Hazard, and Saving the World Through AI

  • A Process for Testing Email Security

    Mimecast’s recent Email Security Risk Assessment (ESRA) is a great read on the topic of threats to email (not to mention including a nice infographic suitable for printing and framing). Let me provide here a brief summary of how the Mimecast team executes ESRA tests, which it has been doing for the past couple of years. Their fine process illustrates how source selection or review might be performed for any number of email security offers.

  • HMG Tech News Digest June 14

    Trending News CrowdStrike's IPO, the Proposed UTC/Raytheon Merger, Bezo's Looking Beyond Earth as Amazon Growth Continues, and Thinking About Data in Terms of Dollars

  • Book Review: Malware Data Science by Joshua Saxe with Hillary Sanders

    One perk of teaching is the free books. Lots of them. They usually come with a lovely letter suggesting that the new edition of The Grand Handbook of Cyber Security – and they all sound like that – would be just perfect for your graduate or undergraduate students. I usually hand these freebies, unopened, to the nearest student I can find. I’m not saying the books are always terrible, but I prefer to select books on my own, thank you.

  • HMG Tech News Digest June 7

    Trending news on Bill Gates and Ubers Travis Kalanick and Dara Khosrowshahi invested in an AI Hardware startup, Apple and Google are upgrading their smart phones, and Amazon smart doorbells generating videos for local police departments.

  • Risk-Based Vulnerability Lifecycle - Prediction and Validation

    When an enterprise examines its cyber risk, an attack surface emerges. This is the set of entry points where vulnerabilities can be exploited by malicious actors. Viewing cyber risk in this way results in the strategic objective to reduce that attack surface, generally through discovery of vulnerabilities, combined with purposeful action designed to reduce the risk of exploits to such weak points. Prediction and validation are key activities in this regard.