by iTrust | Apr 27, 2016 | Blog, Uncategorized
Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools. Read the...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
Just like an evacuation plan at your home when a fire strikes, you need a disaster recovery blueprint set aside so that everyone in the company knows what to do and where to go when disaster strikes the network. Here’s a list of 10 tips that will help keep things...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
A former IT engineer for a Dallas law firm was sentenced to 115 months in prison and ordered to pay $1.697 million in restitution for a destructive computer attack he committed against his former employer in 2011. The sentencing comes in the wake of a flurry of...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
In the past year, the search engine giant has detected close to 800,000 sites infected with drive-by download malware and other malicious content aimed at nabbing unsuspecting visitors. Read the...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products. Read the...
by iTrust | Apr 19, 2016 | Blog, Uncategorized
A cybercrime gang has been using new malware to target business customers of banks in the United States and Canada and steal millions of dollars, primarily from business accounts, researchers at the IBM X-Force security group warn. Read the...
by iTrust | Apr 14, 2016 | Webinars
Ever wonder what it’s really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn’t be your first. Join our panel of cybersecurity...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
Federal regulators have issued new guidance urging healthcare organizations and business associates to bolster their cyberattack defenses. The advice comes after several high-profile attacks, including one targeting MedStar Health that forced the 10-hospital system to...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
How to get to that culture of openness is the problem. In general, Business has no wish to understand Security, that’s what it pays CIOs and CISOs to do. CISOs know and grapple with this problem all the time and the reality is that it will most likely be solved...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
A new survey into cloud concerns undertaken by database security firm HexaTier provides no surprises: security risks (44%) followed by compliance and regulation (29%) are the two biggest factors preventing greater cloud adoption (although we are specifically talking...
by iTrust | Apr 5, 2016 | Blog, Uncategorized
Cyber insurance rates have dropped, thanks to a drop in major data breaches. The relative quiet in massive breaches has prompted insurers to lower insurance prices during first three months of 2016 for high-risk industries including retail and healthcare, according to...