Entries by Keith Do

12 Strategies To Get Your Staff To Stay On Top Of Software Updates

Forbes | January 16, 2020

A big irony in security is that the more critical a system is, the less likely it is to be patched well! To keep critical systems available, teams often deprioritize security. While security is abstract, an unavailable system is tangible and immediate. Security teams need to make the risk real […]

How Defense Contractors Should Prepare for a Cyber Proxy War With Iran

ClearanceJobs | January 10, 2020

Eighteen months have passed since that day on June 27, 2017, when an IT administrator, working for the world’s largest shipping conglomerate, watched helplessly as one computer monitor screen after another in Maersk’s Copenhagen headquarters went black.

The question as we head into 2020 is, what lessons can we take […]

What’s your agency’s cyber resiliency score?

FedScoop | January 8, 2020

Eighteen months have passed since that day on June 27, 2017, when an IT administrator, working for the world’s largest shipping conglomerate, watched helplessly as one computer monitor screen after another in Maersk’s Copenhagen headquarters went black.

The question as we head into 2020 is, what lessons can we take […]

Network Resilience vs. Cyber Resilience

SIGNAL Magazine | January 6, 2020

There are certainly similarities between network resilience and cyber resilience. The foundation for both is the ability to maintain business or mission capabilities during an event, such as a backhoe cutting your fiber cables or a nation-state actively exploiting your network. But there are also significant differences.

Can the UK government’s efforts solve the cyber skills gap?

Computer Weekly | December 30, 2019

The scarcity of skilled cyber security workers in Europe is getting worse, with just under two-thirds of employers saying they are now short of staff, according to the latest report from (ISC)2.

Mike Lloyd, chief technology officer at cyber risk modelling platform provider RedSeal, says that what is required […]

RedSeal Named TMC 2019 Cloud Security Excellence Award Winner

Cloud Computing Magazine | December 23, 2019

For the third year in a row, RedSeal received Technology Marketing Corporation’s Cloud Computing Security Excellence Award. The awards, presented by Cloud Computing magazine, honor solutions in two categories: those that most effectively leverage cloud platforms to deliver network security, and those providing security for cloud applications.

It’s Time to Act: Establish a Secretary of Cybersecurity (Contributed)

Government Technology | December 19, 2019

All levels of government, as well as the private sector, face growing dangers from cyberthreats. That’s why there needs to be a centralized approach to cyberpolicies before a crisis occurs.

Today, the United States is in a very similar place when it comes to cybersecurity: cyberthreats challenge our economy, […]

Tips and Guidance For Educational Entities To Ensure The Safety and Security of Their IT Data

Education IT Reporter | December 17, 2019

Schools are especially prone to ransomware attacks, due to the combination of weak security protocols, out of date computer equipment, and a lack of skilled staff. Digital infections can spread among school computers much the same as biological germs spread among students. Security is unfortunately quite a lot like […]

Securing the Supply Chain Against Cyber Disruption

Loss Prevention Magazine | December 11, 2019

Just like a physical chain, a supply chain is only as strong as its weakest link. Today’s issues are about networks of interdependence. We extract major economic benefits from modern supply chains, because each organization can focus on its core mission or specialty. This narrowing of focus is […]

Forget Cybersecurity

Corporate Board Member| December 6, 2019

Cyber risk is a board-level issue because a breach can crush a company’s stock price, tarnish its reputation and scare off customers and partners. A study by the Ponemon Institute revealed that a company’s stock price drops an average of 5 percent immediately after a breach is exposed. The study further […]