Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: Security
-

Early on July 4, hackers redirected traffic from Stearns County’s website to a site that claimed to be “testing some tricks.” A similar hack happened two days later in Leon County, Florida. In the aftermath of both breaches, employees from both county’s information services departments worked tirelessly to analyze the threat and prevent future ones.…
-

Accenture have become the latest major cybersecurity provider to be left red-faced regarding their own security. While it appears that major damage was averted, Accenture reportedly left a large cache of sensitive information without password protection on their cloud storage. Cybersecurity has become one of the hot topics for businesses around the world. In the…
-

It’s a constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line. Despite the headlines, growth-oriented executives tend to prioritize other expenses. Despite repeated major, high-profile breaches, most cybersecurity teams still struggle to get sufficient funding. “After this hack, cybersecurity budgets are bound to increase.” We’ve all thought it. But,…
-

Why you need to go beyond compliance. Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately $194 per record. Loss of business due to…
-

The growing complexity (Part 1) of today’s networks and the growing sophistication of today’s threats has outpaced the ability of most traditional security devices to keep up. Until now, the approach of far too many IT teams has been to simply throw more money at the problem by adding yet another device into their security…
-

It seems like CSOs are always seeing flashing red lights on their security dashboards these days, warning them of another breach or risk of compromise. There are so many security events happening day in and day out that it’s difficult to decide what’s the top priority. That’s a good metaphor for the state of cybersecurity…
-

Cybersecurity initiatives for government agencies — in fact, other organizations, too — have to be proactive and iterative. According to the US Office of Management and Budget, federal agencies reported 30,899 cybersecurity incidents to the Department of Homeland Security last year. Threats are evolving across multiple vectors as the number of potential entry points expands…
-

Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. Attrition is up, and cyber attacks are on the rise. With continued burnout and a growing skills gap in an industry where mentorship is a lost art, how can enterprises prepare for resiliency? Feeding…
-

Charles Darwin’s theory of evolution, introduced in 1859 in ‘On the Origin of Species,’ focused on natural selection—which evolved into the well-known phrase “survival of the fittest.” Applying that to the cybersecurity industry means that only some businesses can compete in the modern cybersecurity landscape and survive the natural selection, and that might not be…
-

The Homeland Security Department attempts to set the standard for fielding cyber technologies. A group of U.S. government researchers focused on fortifying homeland security has cybersecurity technology development down to a science. Those researchers work for the Department of Homeland Security (DHS), within the Science and Technology Directorate’s (S&T’s) Cyber Security Division. The division, like…