Blog

CIO vs CSO: Allies or Enemies

Whenever a breach occurs it reveals weaknesses in how an organization approached security. Compromises are a great way to reveal the hidden sins organizations are committing. In the case of the Target breach, it is a gift that keeps on giving. While the initial breach report came out in December, it seems...
Read more

Defending Against the APT

Advanced Persistent Threat (APT)   Introduction APT, formerly known as the Advanced Persistent Threat, is the buzz word that everyone is using. Companies are concerned about it, the government is being compromised by it and consultants are using it in every presentation they give.   One of the main reasons organizations are broken into today is because they are...
Read more

Tips for Small Businesses from a Cyber Security Expert

The Internet offers small businesses a competitive advantage in a tough market thanks to the exposure they receive online. However, while they can compete with larger businesses online in terms of marketing and visibility, their IT budgets and security efforts simply can't keep up. Cybercriminals realize that small businesses are easy targets because they are...
Read more