Search

Results 1-20 of 82 for Ed Moyle.
EXPERT ADVICE

Cybersecurity Assessment and the Zero Trust Model

Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and w...

ANALYSIS

Cybersecurity and Your New Remote Workforce

For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a...

OPINION

Information Security: New Rules

Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out how accurate this witticism has been in the fi...

ANALYSIS

Can You Hear Me Now? Staying Connected During a Cybersecurity Incident

While good communication is pretty much universally beneficial, there are times when it's more so than others. One such time? During a cybersecurity incident. Incident responders know that communication is paramount. Even a few minutes might mean the difference between closing an issue vs. allowing...

ANALYSIS

Is It Time to Hire a Cyber Specialist?

Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in im...

ANALYSIS

Preventing ‘Natural’ Cybersecurity Erosion

Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view, at least -- about the same likelihood each tim...

Cybersecurity Economics: The Missing Ingredient

There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. Consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis. In se...

ANALYSIS

Protecting Against ‘Natural’ Cybersecurity Erosion

Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view, at least -- about the same likelihood each tim...

ANALYSIS

Fileless Malware: Why You Should Care

It's a truism that just like organizations adapt, so too do criminals. For example, anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attem...

ANALYSIS

Turning ‘Shadow IT’ into ‘Better IT’

Sometimes things happen that seem undesirable, but they actually can turn out to be advantageous when viewed in a certain light, when approached in a certain way, or depending on circumstances. For example, this can be true when it comes to "Shadow IT" -- specifically, the adoption of technology wit...

ANALYSIS

IoT: Why Security Pros Need to Prepare Now

Have you ever heard of the Cullinan diamond? If you haven't, it was the largest diamond ever discovered: a 3106 carat diamond found in 1905 in South Africa. What's interesting about the Cullinan diamond isn't so much the discovery of the stone itself but what happened afterward: specifically, the cu...

EXPERT ADVICE

Criticism: A Security Chief’s Most Valuable Resource

This past week, a lesson about enterprise information security found its way to me via a somewhat unorthodox channel: specifically, an episode of Gordon Ramsay's Kitchen Nightmares. In this particular episode, the upshot was that Ramsay wasn't able to help. Why not? The owners weren't able ...

EXPERT ADVICE

Android: A Second Career in Security?

Sometimes it's a mistake to assume something -- or someone -- has outlived its usefulness just because it's already done one thing successfully. For example, many of us have a wealth of decommissioned corporate-provisioned mobile devices: We've bought them, handed them out, and seen them used succes...

ANALYSIS

Keeping Up With the Future: Risk Management for Rapid Technology Adoption

Everyone knows that protecting an organization's technology footprint has always been a delicate balancing act. Nowadays, literally everything about a given organization's technology portfolio is in a near-constant state of change; technologies change, usage changes and the threat landscape changes....

EXPERT ADVICE

Why Bad Security Can Happen to Good People

Sometimes you can do everything right and still run into trouble. To see this in action, pay attention the next time you're driving at dusk -- for example during an evening commute, if you have one. If you do this, chances are good that you'll notice at least one person with their headlights turned ...

EXPERT ADVICE

SMBs Can Be More Secure With Cloud, Virtualization, BYOD

If you're a technology professional in a small or mid-sized business, chances are pretty good that information security is something you've had on your radar for quite a while now. In a smaller shop, this is usually out of necessity. As well all know, SMBs usually don't have the luxury of an expansi...

EXPERT ADVICE

Disaster Planning on an SMB Shoestring

For folks on the East Coast of the United States, the past few weeks have been pretty intense. Between hurricane Sandy and the associated fallout -- flooding, lack of public transportation, power outages, dark cell towers -- many firms in impacted areas have experienced firsthand the value of their ...

EXPERT ADVICE

Open Source Ammo for the SMB Security Arsenal

Technology professionals who work in and around SMBs know that sometimes bringing up information security in a smaller IT shop can be a tough sell. In many cases, SMBs feel that they don't present an attractive or large enough target for hackers to be interested in them. For example, a small communi...

EXPERT ADVICE

How Much IT Policy Is Too Much?

As almost everyone has probably already noticed by now, there are some radical changes going on in the way that organizations purchase, manage and use technology. Since IT is by its very nature adaptive, this is not totally unexpected. However, even though we expect technology to change, there are p...

EXPERT ADVICE

5 Warning Signs of Ineffective Security

Most cars nowadays come with driver and passenger airbags. It's a great safety feature that's helped save numerous lives since installing them routinely has become the norm. But sometimes, though it is rare, airbags fail to deploy even when circumstances arise where they should. Ask yourself: How ...

Which most influences your decision to accept a LinkedIn invite from a stranger?
Loading ... Loading ...

LinuxInsider Channels