Implications of smaller-scale breaches: The insider threat

Insiders have an advantage over outsiders with malicious intentions. Possessing the knowledge of a company’s physical and technical security policies and procedures allows insiders to bypass safeguards that are implemented to defend against external threats. Insider...

Implications of Smaller-Scale Data Breaches (Pt. 1)

Unless you’ve been living under a rock, you’ve heard all about the massive Target data breach. After all, it’s hard not to take notice when the personal information of 110 million people is stolen. However, such massive breaches are rare. Far more frequent, are...

ThreatLAB2014: The Cybersecurity Conversations you Need to Hear

It was the second day of ThreatLAB2014 and the room was full. The final closing remarks and “thank you’s” were said and done; the plates from the wonderful lunch provided by the Las Vegas Monte Carlo Resort and Casino were cleared. Effectively, the conference was...

Threat Lab 2014 is Coming: Join Us in Solving the Complex Threats Facing U.S. Innovation

A lot of people have been asking us about ThreatLAB2014. Slots for attendance have been filling up fast and we are hard at work developing the exciting scenarios for the interactive portion scheduled for day one.  In case you haven’t heard, the ThreatLAB2014 event...

IP Protection and the Manufacturing Industry

When you read the morning newspaper, daily articles detail the latest intellectual property, trade secret or personal information theft from commercial and government entities.  On the commercial front, the stories primarily focus on high technology or financial...