Search

Results 1-20 of 92 for Ed Moyle.
EXPERT ADVICE

Cybersecurity Assessment and the Zero Trust Model

Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and w...

ANALYSIS

Cybersecurity and Your New Remote Workforce

For most organizations, COVID-19 has been a literal transformative agent. Our organizations have almost overnight gone from environments where teleworking was an exception, to where it's the norm. As any student of human nature will tell you, people tend to view "the new" with reservation. There's a...

OPINION

Information Security: New Rules

Warren Buffet once said, "Only when the tide goes out do you discover who's been swimming naked." You can cover over a host of sins when times are good, but bad or unsafe practices will be exposed when times are rough. Time and experience have borne out how accurate this witticism has been in the fi...

OPINION

RSA, COVID-19 and Risk

Two things are happening simultaneously: The RSA Security Conference is in full swing and so is COVID-19. It's a strange juxtaposition. The conference is going on undeterred just a few blocks from where the mayor declared a state of emergency due to the ongoing spread of the virus. There's also topi...

OPINION

What’s in Your Containers? Try an Open Source Tool to Find Out

As most security pros know, application containers -- Docker, rkt, etc. -- and the orchestration elements employed to support them, such as Kubernetes, are used increasingly in many organizations. Often the security organization isn't exactly the first stop on the path to deployment of these tools.

OPINION

Consider Service Mesh as a Security Tool

If you're like most security pros, chances are pretty good that you're starting to get frustrated with microservices a little bit, or maybe a lot. Microservice architectures -- that is, architectures that leverage REST to build a number of small, distributed, modular components -- are powerful from...

ANALYSIS

Tackling Economic Security Governance

If you've ever played chess, you know that each move you make has to be the best move. At one level, this is painfully obvious -- after all, who would choose to make a terrible move instead of a better one? -- but it's illustrative of an important concept. Specifically, the core reason it's true is...

SECURITY

Security Pros: Be on High Alert for Certificate Changes

They say that the key to good security is constant vigilance. As a practical matter, this means that it's important for security and network pros to pay attention to two things: changes in the threat landscape, so they can be on the alert for how their systems might be attacked; and changes and deve...

ANALYSIS

Can You Hear Me Now? Staying Connected During a Cybersecurity Incident

While good communication is pretty much universally beneficial, there are times when it's more so than others. One such time? During a cybersecurity incident. Incident responders know that communication is paramount. Even a few minutes might mean the difference between closing an issue vs. allowing...

ANALYSIS

5 Effective Talent Retention Strategies for Security Teams

In IT, we've been hearing about the "cybersecurity skills shortage" for a few years. There is no shortage of statistics and data about it: More than 70 percent of participating organizations reported being impacted by the skills shortage, according to an ESG/ISSA research report. Likewise, more than...

ANALYSIS

Breaches: Fix the Issue, Not the Blame

Following a natural disaster that causes property damage to businesses and homes -- say a hurricane, fire or flood -- how often do you hear suggestions that the victims were at fault for their misfortune, or that they could have done something to prevent the event from occurring in the first place? ...

ANALYSIS

Is It Time to Hire a Cyber Specialist?

Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in im...

ANALYSIS

4 Techniques for Validating Enterprise Blockchain

Let's face it, there's been a lot of hype about blockchain over the past few years. Nowadays though, there are signs that we may be on the cusp of moving from the "blockchain will solve all your problems" segment of the hype cycle into the "blockchain may be useful for a few targeted applications" ...

ANALYSIS

Preventing ‘Natural’ Cybersecurity Erosion

Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view, at least -- about the same likelihood each tim...

ANALYSIS

When Is the Time to Hire a Cyber Specialist?

Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in im...

Cybersecurity Economics: The Missing Ingredient

There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. Consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis. In se...

ANALYSIS

Protecting Against ‘Natural’ Cybersecurity Erosion

Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view, at least -- about the same likelihood each tim...

ANALYSIS

Security Economics: The Key to Resilience

There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. Consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis. In se...

ANALYSIS

Realistic ‘Zero Trust’ for Your Cybersecurity Program

If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. Counterintuitive...

ANALYSIS

Closing the Enterprise Security Skills Gap

The security skills gap has become a topic of acute interest among practitioners responsible for building security teams for their organizations -- and keeping them running smoothly. It impacts everything from how they staff, how they cultivate and develop their workforces, and how they train, to th...

Technewsworld Channels