CyberSecurity And Your Business

59350241

Billions of dollars are spend yearly in cyber security globally, and according to the most recent surveys, that amount is likely to reach $101 billion by the year 2018.

But, although billions of dollars are spend trying to secure the amount of information hackers or other people have access to, many cyber analysts believe that spending more in cyber security does not necessarily mean better security.

For more about this topic, follow the links below.


Mobile Messaging Apps: 8 Tips For Keeping Your Workplace Secure

The old struggles over BYOD have been replaced with application struggles, as employees use favorite mobile messaging apps for enterprise purposes. As with BYOD, pushing back isn’t the answer. Innovating forward is.

Using popular third-party messaging apps such as Facebook Messenger, WhatsApp, and Snapchat for business communication can introduce a level of discomfort for IT, as well as for your legal, corporate, and governance and compliance teams. In many ways, it’s like the early days of the Bring Your Own Device (BYOD) movement; these days it’s all about Bring Your Own Apps.

“The issue of employees using personal social media accounts/networks, and their non-work personas, for business purposes is very real and it does impact IT, especially when considering that electronic communications should be retained for legal and regulatory purposes,” Mike Pagani, the chief evangelist at Smarsh, told InformationWeek in an interview.

Smarsh offers an archiving platform that supports social media, text messages, email, and other platforms so that they’re indexed, policy-checked, able to be supervised, and easily retrievable if they’re needed for auditing or litigation.


A reality check for security leaders on insider risk

Mike Tierny shares his insights on successfully implementing processes to combat insider risk by engaging the right people at the right time in the program.

“I trust the people in my company. I still monitor everyone.”

That statement came during the MISTI CISO Leadership Summit I lead on Sunday at InfoSecWorld. One of the security leaders made that comment during our session on trust. It got a lot of nods and even more discussion.

Just the week prior, I talked with Mike Tierney (LinkedIn, @mikejtierney) the COO of Veriato Inc. about the reality of insider threat and our need to engage others in the process. As COO, Mike is ultimately responsible for organizational security.  His insight on insider risk is forged by experience and his success implementing processes across the organization.

During our conversation, he talked about the leadership approach of engaging others in the process – before we have problems. He shared some things I hadn’t seen implemented before. Approaches that made sense.


Cybersecurity spending: more does not necessarily mean better

Cybersecurity is not something you can just buy, but something you should thoroughly build.

Last week, I had a great opportunity to explore the APAC cybersecurity market and meet many brilliant people during Black Hat Asia 2016. Singapore’s economic miracle made its cybersecurity market as attractive as the North American one, attracting the largest security vendors to the region.

Advanced Persistent Threat (APT) protection, Threat Intelligence, Enterprise Immune Systems, Cloud Access Security Brokers (CASB), User and Entity Behavior Analytics (UEBA) – these are just a few of the offerings currently available on the cybersecurity market. I bet that many security industry professionals (including myself) hardly understand the real meaning of some of these terms, or to be more precise – the real difference between them and the generic terms existing for years. But this is a topic for a dedicated article, and in this piece we would rather concentrate on cybersecurity budgets and related challenges.