Layered Defense

Keeping “IT” Security Real, Re-imagining Cyber Defenses

Much has changed due to Covid-19, Remote Work from Home (or Anywhere) and the ongoing SolarWinds fiasco have caused every cybersecurity team to review “what really matters in terms of cyber risk,” and master the basics as the foundation of their security program. As I have been known to say, in ‘cyber’ what was once true yesterday, may not be so today! It is often recommended to check-in from time-to-time and explore what may have changed. This continues to ring true today. When Covid-19 lockdowns were officially announced in March of 2020, much of the workforce had to rapidly shift to a new mode of working opening or compound existing …

Keeping “IT” Security Real, Re-imagining Cyber Defenses Read More »

Keeping IT Security Real Re-imagining Defenses

Cyberspace Solarium Commission

Cyberspace Solarium Commission Our Strategy After conducting an extensive study including over 300 interviews, a competitive strategy event modeled after the original Project Solarium in the Eisenhower administration, and stress tests by external red teams, the Commission advocates a new strategic approach to cybersecurity: layered cyber deterrence. The desired end state of layered cyber deterrence is a reduced probability and impact of cyberattacks of significant consequence. The strategy outlines three ways to achieve this end state: Shape behavior. The United States must work with allies and partners to promote responsible behavior in cyberspace. Deny benefits. The United States must deny benefits to adversaries who have long exploited cyberspace to their advantage, to American …

Cyberspace Solarium Commission Read More »

Cyberspace Solarium Commission

How to Fortify Your Organization’s Last Layer of Security – Your Employees

How to Fortify Your Organizations Last Layer of Security – Your Employees “…people play an undeniable role in an organization’s overall security and risk posture.” – Gartner Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. One reason for that is that hackers have realized it’s easier to find someone who may be willing in a moment of weakness to open an attachment containing malicious content than to exploit technical vulnerabilities within  computer software, according to Symantec. When it comes to combatting these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be …

How to Fortify Your Organization’s Last Layer of Security – Your Employees Read More »

Fortify Your Organizations Last Layer of Security Your Employees
Scroll to Top
error: Alert: Content selection is disabled!!