by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
A new survey into cloud concerns undertaken by database security firm HexaTier provides no surprises: security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption (although we are specifically talking...
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
Cyber insurance rates have dropped, thanks to a drop in major data breaches. The relative quiet in massive breaches has prompted insurers to lower insurance prices during first three months of 2016 for high-risk industries including retail and healthcare, according to...
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online....
by Jamie Kerem | Apr 5, 2016 | Blog, Uncategorized
You could be next. Take a look at these examples of how a security consultant was recently hired to infiltrate a company’s buildings and networks – mirroring a crook’s social engineering attempts to get at sensitive personal and corporate data. This was all done...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
It all depends upon your level of risk and how badly you want the data returned to you unharmed. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
To thrive in the cloud era, CISOs must refashion their roles as business enablers, adopt automation wherever possible, and go back to the basics on security hygiene. We’re undergoing one of the biggest transformational changes in IT since the introduction of the...
by Jamie Kerem | Mar 30, 2016 | Blog, Uncategorized
As new security threats continue to emerge and security teams find themselves stuck in the cycle of piling on new products and policies each time they receive an alert notification, true functions of security programs get lost in the clutter. As melting snow and...
by Jamie Kerem | Mar 30, 2016 | Webinars
RSA Conference 2016 broke new ground as the largest gathering of security professionals with +40,000 attendees, +500 exhibitors, and +213,000 square feet of exhibit space. While keynotes, and many speakers addressed global and national issues, these topics often have...
by Jamie Kerem | Mar 20, 2016 | Webinars
Rapidly evolving cloud technologies makes evaluating security and compliance risks a difficult proposition. Cloud service providers and their clients have a shared responsibility for security and compliance; but defining these roles can keep you running in circles. In...
by Jamie Kerem | Dec 9, 2015 | Webinars
2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
by Jamie Kerem | Oct 28, 2015 | Webinars
Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We’ll dive into a...
by Jamie Kerem | May 21, 2015 | Webinars
With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...