From the Fall 2022 Issue

Integrity Matters

Author(s):

Malcolm Harkins, Chief Security and Trust Officer, Epiphany Systems

Integrity Matters

“A true leader has the confidence to stand alone, the courage to make tough decisions, and the compassion to listen to the needs of others. He (she) does not set out to be a leader, but becomes one by the equality of his (her) actions and the integrity of his (her) intent.” – Douglas MacArthur … Read more

From the Fall 2022 Issue

Ransomware Resiliency for Storage and Backup: Trends, Threats & Tips

Author(s):

Doron Pinhas, CTO, Continuity

ransomware-resiliency-doron-pinhas

Background Ransomware attacks have been in the public eye for quite a while now. Growth is propelled not only by the surge in the number of cybercrime groups specializing in ransomware, but to a large extent, also by the continual increase in attack sophistication. Ransomware has evolved into a fully-fledged industry, with competing groups that … Read more

From the Fall 2022 Issue

Risk and Responsibility in the Age of the Cloud

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

cloud risk and responsibility

One common question asked when companies look to cloud computing is, “How secure is the cloud?” It’s a crucial question considering the vast majority of organizations are still on premise or in the early days of their cloud migrations. Amongst the many issues to consider are the following: The safe migration and access of key … Read more

From the Fall 2022 Issue

Government and Industry Cooperation: More Important Than Ever for Cybersecurity Awareness

Author(s):

Chuck Brooks, President , Brooks Consulting International

govt-and-industry-coop

With another National Cybersecurity Awareness Month upon us, few major things have changed from the past year in terms of threats. As the capabilities and connectivity of cyber devices have grown, so have the cyber intrusions from malware and hackers.  The cyber- threat actor ecosystem has grown in both size and sophistication.  They are also … Read more

From the Fall 2022 Issue

Zero Trust is Not a Product

Author(s):

Alex Haynes, CISO , IBS Software

Zero Trust is Not a Product

Every year at the bevy of conferences that dot the Information Security landscape you can always detect an inherent theme. This may be influenced by acute threats (i.e., Ransomware), a new regulatory environment (i.e., GDPR) or even just a sudden change in how we work, as we all experienced during the pandemic. The issue Zero … Read more

From the Fall 2022 Issue

Five Ways to Solve the Cybersecurity Skills Gap

Author(s):

Jayant Kripalani, Consulting Sales Engineer - Security, Splunk

Five Ways to Solve the Cybersecurity Skills Gap

An effective cybersecurity strategy encompasses an organization’s people, processes, and technology. While processes and technology are in a constant state of iteration and improvement, hiring and retaining talented people in cybersecurity roles has been an issue for at least a decade—and it’s getting worse. Information Systems Security Association International (ISSA) reports that in 2021, more … Read more

From the Fall 2022 Issue

7 Reasons to Deploy Continuous Identity Confirmation Technology in Your VDI Environment

Author(s):

Paul Baker, Director of Channel Sales, Plurilock Security, Inc.

CICT in VDI Feature

Many organizations have accelerated the adoption of Virtual Desktop Infrastructure (VDI) in light of changing work strategies. However, how can you confirm that the user remotely signed in to a virtual desktop is the authorized user rather than a stranger in possession of a stolen session or stolen credentials? This article will look at the … Read more

From the Fall 2022 Issue

Cybersecurity Threats: How to Monitor For and Report Them

Author(s):

Shannon Walker, Founder and President, Whistleblower Security Inc.

Cybersecurity Threats

Businesses face the threat of potential cyber-attacks every day. Whether they are large or small, companies are exposed to risks from hackers wanting to steal sensitive data or disrupt operations. Consider the following cases. In 2015, Dr. David Kreir’s small business, Volunteer Voyages, incurred $14,000 in fraudulent charges after a thief stole their online debit … Read more

From the Fall 2022 Issue

The Ransomware Threat in Healthcare: 2022

Author(s):

John Price, Chief Executive Officer, SubRosa

Ransomware Threat in Healthcare

Since the onset of the COVID-19 pandemic, the healthcare sector has witnessed a series of sweeping changes that have transformed its digital landscape. From the rise of telemedicine to the increased integration of medical IoT devices, many of these changes have extended the capabilities of healthcare providers and helped them deliver better patient experiences. As … Read more

From the Fall 2022 Issue

Women in Cybersecurity Law: Undermining Prejudices

Author(s):

Elizabeth B. Shirley, Partner, Burr & Forman LLP

women-in-cybersecurity-law

Girls and women too often avoid pursuing studies and careers in fields based in math and science, such as information technology, cybersecurity and, in the context of law, cybersecurity law. Indeed, there is (and was) a misperception and deeply rooted prejudice that girls and women are, by nature, not good at math and science. These … Read more