cybersecurity
Take Seriously This Sentence in the Cybersecurity Executive Order
The Cybersecurity Executive Order that President Trump signed on May 11 shouldn’t tell you much that don’t already know about the importance of security to the Federal Government. However, there’s a sentence in it that should give every agency leader a fresh sense of urgency: “The President will hol…
Making Cybersecurity a Part of the Smart City Process
The rapid and inevitable hyper connectivity manifesting in the evolving digital world, while opening up massively impressive opportunities, leave many organizations exposed to new entry points where nefarious cyber actors can inflict damage. Recently, we just watched this unfold across the world wit…
Less is More – Fewer Cybersecurity Vendors Yield More Effective Security
As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 6…
May 25th #CiscoChat Recap: Securing Your Network in the Age of #Ransomware Attacks
Maybe your users mistakenly clicked on a suspicious ad. Or maybe they were tricked into opening an email link. But no matter how it happened, here you are: Ransomware has encrypted your files, and you need to pay a hefty fee to get them back. It’s not just you: The attacks continue to proliferate —…
Is it time to hire cybersecurity guardians for the network?
Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. Hackers are not going away and are getting progressively sophisticated as companies struggle to equip their security teams with the tools and expertise to protect the…
Celebrate HIPAA compliance like it’s 1999
Take a trip with me, if you will, back to the turn of the 21st century – when “digital transformation” was but a gleam in our eyes. Back then, we barely had email at work. The internet was still kind of a novelty. And social media had yet to be invented. (How did we survive?) THIS was the highest-te…
Cisco IoT Threat Defense: Securing the IoT at Scale
Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of ca…
Held for Ransom(ware): Protecting Your School—and Data—from Current Cyber Threats
When news broke last week of cyber attacks threatening systems in nearly 150 countries, the first thing I did was rush to make sure my home PC was protected. (It was.) It’s likely that individuals and organizations—including K-12 schools, colleges and universities—the world over had the same reactio…
WannaCry Type Ransomware a Growing Threat: 5 Easy Steps to Protect Your Agency
It all started harmlessly enough. A pleasant sounding ping on her phone and a quick check of her email. But it then quickly descended into a weekend of worry. For people in both the public and private sector, cyber attack has become a potentially life-altering and seemingly unstoppable threat that i…
2