Perfect Storm For Cybersecurity Risk

Greg Masters, Managing Editor of SC Media does a great job painting a clear picture of cybersecurity this year from the statistics recently published in ISACA’s “State of Cyber Security Study 2017”.  It is clearly a“Perfect storm: Not only is the volume and complexity of cyberattacks increasing, but there’s also a lack of resources necessary to[…]

Better Cybersecurity Starts With Mindset Change

Your Mindset is STILL the key element to better cybersecurity. Your understanding of the newest threats and defense technologies, and your willingness to make changes are what improve your cybersecurity. There will always be discussion and buzz on new tools and tactics, but the essential element is your cybersecurity mindset.   If you fail to grow[…]

Prevention Beats Remediation

$10 Million in Remediation and Counting!! For those that have been following the Yahoo breaches, news reports today are stating the investigation and remediation costs are $10 million and STILL COUNTING! And that is NOT total losses. What will be the agreed upon value of Yahoo for the Verizon acquisition that is still pending? Hmmm.[…]

What is Application Control?

What is Application Control? Apparently, Application Control is whatever the salesperson says it is!   NOT! 2017 is going to be another big year of change for Cybersecurity professionals as hackers continue their successful campaigns to phish, breach, and collect ransom money. And vendors will continue to add new “Application Control” products to their portfolios, and market each of[…]

Jim McLendon now COO of White Cloud Security!

WHITE CLOUD SECURITY, INC. PROMOTES FORMER SYMANTEC EXECUTIVE TO ROLE OF CHIEF OPERATING OFFICER Austin, Texas – December 1, 2016 White Cloud Security is pleased to announce the promotion of Jim McLendon to the role of Chief Operating Officer for White Cloud Security, Inc. Jim McLendon, USAF Colonel (Retired), retired from a distinguished career in[…]

DDoS Attacks – Making Sense Of It

Cybersecurity has certainly had an interesting few days with the massive DDoS attacks across the USA. The cause, the method, and the massive reach of this DDoS attack truly underscores another dimension of the importance of cybersecurity: making sure your network is not participating in an attack like this. Breaking down the DDoS attack to[…]

Cyber-Security

Cyber Security – Information Security

Protect ourselves with cyber security is fundamental. In our organization, personal life, as well as in our schools. “Cyber security practitioners, perform job functions related to protecting and defending information systems. This is done by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.” CyberSec First Responders Certification Benjamin Franklin; “An ounce of prevention is worth a pound[…]

Application control, ransomware, computer security

Application Control – Prevent Ransomware

Begin protecting your computer today by using advanced application control. Given the volume of unknown malware, new variants, zero-day exploits, and hackers that are stealing and/or posting your data online, what good is any software that cannot stop the hack?  The second your data is stolen, you’re done!  There is no remediation.  Except to pay fines and eat the[…]

insurance-protection

Cybersecurity Insurance – Is it Lucrative?

Business Owner:  “What you think about cybersecurity insurance?” Me:  “Very lucrative business today.” Business Owner:  “No, I mean, do you think I need some?” Me:  “Oh!  What you’re really asking is, will it save your bacon if you get hacked.” Business Owner:  “er…um…Yeah! Me:  “Maybe.  The cost/value of cybersecurity and cybersecurity insurance both depend on[…]

cyber security stacks-of-money

Cybersecurity – The Real Cost

The burden of proof always falls upon the CIO, CISO, InfoSec Specialists, and IT Service Providers in justifying the costs for cybersecurity. Or maybe they delegate the cost justification further down the ladder to you. In any case, that cost calculation needs to be done with both current operational data, and current valuation of breach[…]