Blog

Threat-Countering: Refining Risk-Based Cybersecurity

Geoff Stoker on Apr 9, 2019 8:38:00 AM

 

Meddling in Elections - The Case of Russian Attackers

Liisa Past and Alexander Grimm on Apr 3, 2019 4:03:47 PM

 Ukraine has proven to be a testing ground for Russian aggression in cyberspace.

Breaking Down a Few Cybersecurity Myths

Rebecca Skubish on Mar 5, 2019 10:52:50 AM

 

Cybersecurity Crisis Management (CCM) Considerations - A 7-Step Strategy

Geoff Stoker on Feb 26, 2019 9:03:00 AM

 

Does your organization have a stated cybersecurity crisis management (CCM) strategy? If you said “no,” then by implication your actual strategy is to rely on your team’s experiential-based gut..

The (Cyber) Risk of Human Misjudgment

Geoff Stoker on Feb 14, 2019 10:16:00 AM

 

You’ve likely heard of Warren Buffet, but have you heard of Charlie Munger, the slightly more irreverent half of Berkshire Hathaway’s investment leadership team? If you know of him, have you..

Cybersecurity Risk & Fundamentals

Geoff Stoker on Feb 11, 2019 9:05:00 AM

 

On September 7, 2017, Equifax announced it had suffered a cybersecurity incident resulting in the download of millions of consumers’ personal information from mid-May through late July. Last..

Hope and Hype for Cybersecurity AI

Geoff Stoker on Feb 6, 2019 9:36:00 AM

 

Modern Artificial Intelligence (AI) research began soon after the end of WW II perhaps best indicated by Alan Turing’s 1950 question, “Can machines think?” Since then, while devoted researchers..

Major Vendors Dismissed Top Vulnerability for Malware Delivery

Paulo Shakarian on Feb 4, 2019 9:02:00 AM

Recent reporting by Cisco on information stealing malware  designed to hide from most anti-virus solutions  is leveraging Microsoft Office vulnerability CVE-2017–11882.

Does..

Training AI to Recognize Cyber Security Threats

Geoff Stoker on Jan 31, 2019 11:23:42 AM

 

Artificial Intelligence Gives Clues About Cyberattack Targets

Rebecca Skubish on Nov 9, 2018 2:24:37 PM