Implement Data Security Processes to Stay “Left of Boom”

“Left of boom, right of boom” is a military term for the left-to-right timeline of the moments before and after a bomb explodes. Washington Post writer Rick Atkinson brought the term to the public in his 2007 series on the U.S. military’s efforts to stay left of boom during the Iraq war. Atkinson detailed how …

Data Lifecycle Management Begins at the Endpoint

All businesses and public sector organizations are experiencing massive information growth. Gartner expects data volume to grow 800% over the next five years, and 80% of it will reside as unstructured data. And, IDG predicts that by 2022, 93% of all data will be unstructured. Where all of that data originates and resides may surprise …

A Dubious Honor for the Year 2017

2017 was a record breaking year. Just a few examples: 25,000: The Dow Jones industrial average passed 25,000 for the first time ever in December. 6,104: The total number of home runs hit during the 2017 Major League Baseball season, smashing the previous record of 5,693. 72: Joey Chestnut won his 10th-straight Mustard Belt after …

Why a CISO Would Make a Good Football Coach

The college football playoff games are set, and the NFL postseason begins in just a few weeks. All of these high stakes games have me thinking about how the people that make up an organization’s information security team resemble a football team on game day. Years ago, the traditional approach to cyber security looked more …

Let Us Be Extra Vigilant with Our Data This Holiday Season

Thanksgiving weekend is behind us, so it’s official – the holiday season is here. That means virtually everyone not named Ebenezer Scrooge is busy shopping, attending parties, and bracing for visits from the in-laws. People are easily distracted, and that can increase the risk of your organization suffering a data breach. Innocent insiders are more …

Where There’s a Data Breach, Litigation Follows

We’ve seen a number of reports on the rise in the number of data breaches. But perhaps the statistic that hits hardest is this: More organizations are finding themselves in court after suffering a breach. InfoSecurity Magazine’s Phil Muncaster reports the number of cases that have come before The High Court (the third highest court …

The Dangers of a “Trust and Forget” Approach to Data Security

“Set it and forget it” is a marketing catchphrase that software vendors use to assure IT administrators that neither they, nor their users, will have to constantly manage notifications and install updates. It was especially popular in the mid-2000’s after Microsoft launched the Vista operating system that was infamous for overwhelming users with a steady …

2018 Imperative – You Need Speed to Avoid the Icebergs

The famous iceberg scene in the movie “Titanic” is a good analogy for why so many organizations struggle to contain the damage caused by a data breach, even after detecting it. The lookouts in the crow’s nest can’t see through the nighttime fog, and when they finally spot the enormous iceberg, the procedure for changing …

What is “Simplicity”? Security Sealed with a KISS

In the 1960’s, a Lockheed engineer named Kelly Johnson overseeing the design of top secret military aircraft instructed his designers to always follow one principle: Keep It Simple Stupid (KISS). He wanted whatever they made, including the S-71 Blackbird spy plane (built in 1964 and still the fastest plane that has ever flown) to be …

Visibility is Critical to GDPR Compliance

May 25, 2018 – If your organization does business in any of the 28 European Union (EU) countries, just seeing that date may cause you to break out in a cold sweat. That’s the deadline for companies that collect data on EU residents to demonstrate compliance with The General Data Protection Regulation (GDPR), which establishes …