Your cart is currently empty!
Tag: Guest articles
-
Admin
Posted on
Note to Cyber Startups: The First $3M is the Hardest
Join Us Now One of my favorite books from the Awesome Eighties was Getting by on $100,000 a Year (and Other Sad Tales) by business writer Andrew Tobias. The implication of the book’s title, coined four decades ago, was that a hundred-K should be an impressive enough salary to keep even the toniest Upper West Side Yuppies…
-
Admin
Posted on
Simon Longbottom, Vice President of Digital Media for Business at Adobe: Keeping Employees Engaged and Motivated Over the Long Term
Join Us Now As the global health crisis nears its one-year anniversary, a top priority for many executives and managers is determining effective ways to keep employees engaged and motivated over the long haul. A recent survey of more than 150 CIOs, CISOs and business technology executives conducted by HMG Strategy reveals that 73 percent…
-
Admin
Posted on
Cloud Application Resilience for Modern Enterprises
Join Us Now The first time I used a computer was during my sophomore year in college. This is significantly later than computer, engineering, or science-educated people in my age group used a computer for the first time—because I was a music major, not because I am that old. Anyway, at the time I was dating an…
-
Admin
Posted on
Critical Infrastructure Attack Reveals Why Access Should be The Nexus of Your Security Program
Join Us Now A cyber attack against a Tampa, FL water treatment plant is the latest reminder that security control of critical infrastructure must continually improve. According to a report by Reuters, a cyber criminal gained unauthorized access to an employee’s TeamViewer application (remote access and desktop support software)i and then used the access to gain…
-
Admin
Posted on
Want to Stop Nation-State Cyber Threats? Simplify.
Join Us Now John Von Neumann once made the following assertion: For small mechanisms, it’s easy to see how they work, but not what they do. In contrast, for large systems, it is easy to see what they do, but not how they work. Based on nearly forty years in cyber security, I’ve come to view this as the central challenge in securing…
-
Admin
Posted on
How to Stand Out in a Commodity Market
Join Us Now When you think about commodity markets, what categories come to mind? Oil? Gas? Metals? Corn? Coffee? And when you think about these categories, what are some attributes of each that contribute to their designation as a commodity? Uniformity? Fungibility? High demand? Necessity? Price fluctuation? All of the above? There are probably finance…
-
Admin
Posted on
The Growing Obsolescence of Credentials (A Guest Article by Jim Routh)
Join Us Now Back at MIT in 1960, Fernando Corbato developed the password while establishing the Compatible Time-Sharing System (CTSS), enabling file permissions to registered users. Sixty years later, User IDs and passwords have served enterprise security remarkably well. Credentials [user IDs and password combinations] remain the predominant method for enabling on-line authentication today on the vast…
-
Admin
Posted on
Cyber Security Witch Hunts
Join Us Now Amidst an epidemic, anger toward outsiders, and simmering hatred between communities of varying affluence, the residents of now Danvers, Massachusetts decided in 1692 to hunt down and blame their sad troubles on a bunch of witches. Culminating in the now-famous Salem Witch Trials, nearly a score of supposed witches including the unfortunate…
-
Admin
Posted on
Meredith Harper, VP CISO, Eli Lilly and Company: It’s Time to Talk Honestly About Diversity, Equity and Inclusion
Join Us Now Racial injustice has come to the forefront of the national discussion in 2020, prompted, in part, by the George Floyd protests in Minneapolis and Black Lives Matter demonstrations in other cities and communities. One of the positive outgrowths from this is the heightened focus on Diversity, Equity and Inclusion (DEI) programs within…
-
Admin
Posted on
How Do We Tell Cyber Security Truths That Might Hurt?
Join Us Now In 1975, Edgser Dijkstra penned an iconic essay entitled “How Do We Tell Truths That Hurt?” In his piece, Dijkstra scolded the computing community for choosing to ignore several obvious facts. While answering endless ridiculous questions about the SolarWinds hack this past week, I decided it was time to re-read the master’s note. As I’d suspected, the parallels lined…