Act Today to Protect Tomorrow’s IoT

Act Today to Protect Tomorrow’s IoT

Recently, while hitching a ride home with a friend, a bell rang through the car speakers, which turned out to be a notification that we were arriving at a frequently visited destination. It surprised and impressed me. I couldn’t help but think about all the recent and...
Cybersecurity in the Workplace – 4 Ways to Mitigate Risk

Cybersecurity in the Workplace – 4 Ways to Mitigate Risk

It’s essential to learn from recent mega-attacks how to better improve our security and mitigate cyber risk. Key to this is an understanding by each and every individual and employee that they play a part. The now-tired expression “security is not just IT” has never...
NIST Framework Offers 5 Steps to Online Safety

NIST Framework Offers 5 Steps to Online Safety

The last decade has seen its share of internet-based innovations in both the public and private spheres. Many, such as the introduction of cryptocurrency, the further refinement of secure transactions, the widespread adoption of cloud services, and others have...
5 Reasons to Make the Business Case for Cybersecurity

5 Reasons to Make the Business Case for Cybersecurity

Today’s cybersecurity landscape goes well beyond the realm of IT and instead requires the devoted attention of the C-suite and boardroom, since they are responsible for driving the risk profile of their organization. This change in approach to who owns security also...
Why Wannacry Has Made the Cyber World Flat

Why Wannacry Has Made the Cyber World Flat

Just as Thomas Friedman’s best seller, The World is Flat, tackled the complex forces reshaping modern political economy, Wannacry is reshaping cyber risk management for the digital economy.  Destructive powers, once the preserve of a few nation states, are now...