CISOs must quickly adapt to any situation

CISOs must quickly adapt to any situation

As most senior security executives know, the era of locked down static security no longer holds relevance in today’s networked world where increased connectivity and collaboration in the commercial space have superseded the need for tightly controlled security. This is not to say security is not looked upon with importance,...

I Need a New Song….

My life has changed dramatically in the last year in many ways.  Professionally, that change has reached the one year milestone this week as a proud member of the Securonix team.  In this time as the Chief Architect, I have been responsible for architecture standards, security hardening, sizing and capacity planning, as...

Retaining security talent by embracing distributed team management

Ask anyone in a security leadership role about their team and you’ll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder. This is one of the key reasons many organizations are embracing a distributed...

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cybersecurity in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of sensitive personal, financial, and intellectual property-related data, it became clear that this...

Why I Joined Securonix

I decided to join Securonix in January, 2016. Like any career change, I made this one with as much care and diligence as possible. This isn’t my first security startup rodeo; I’ve been helping to build security companies for almost 20 years and I have been lucky enough to be...

EU Gets Serious About Cyber Security

By Brian Contos, VP & Chief Strategy Officer, Securonix In a vote of 34 to 2, European Union rules regarding cyber security for critical services such as energy, finance, healthcare and even online services have been informally agreed on and are ready for endorsement by the Council and the full...

Encryption Debate

The encryption debate keeps raging on And while its entertainment value cannot match Republican presidential debate, both sides mean well and bring up compelling (for each side) arguments. Technical aspect of this debate is interesting, and political one is unavoidable, but as FBI director James Comey said at a Senate...

Insider Attacks Were the Most Costly Breaches of 2015

Insiders pose tremendous risk to organizations, according to the most recent Ponemon Report. Malicious insiders were not the most common source of attacks last year, but they were the most costly. According to 2015 data, insider attacks cost companies about $144,000 per incident. Containing and resolving the complexities associated with...

Inside the Ashley Madison Breach

Motivations and insider factors 37 million users may have their personal data at risk as a result of this latest data breach.   There are many factors to this breach that seem different than others that we have previously seen. With most data breaches customers are pursuing legal counsel, speaking to...