Talk to Our Experts  

Information Risk Management Blog

Managing Information Risk For Digital Age: Why It's Not About Security

[fa icon="calendar'] Jul 20, 2016 11:55:59 PM / by Sameer Shelke posted in Information security, infosec, Gartner, information risk, Digital Security

[fa icon="comment"] 0 Comments

Recently I had the opportunity to interact with industry thought leaders, analysts, practitioners and solution providers during the Gartner Security & Risk Management Summit.

I decided to approach the discussions as a student, with the objective of unlearning and learning. After more than two decades in the information security industry, it was a refreshing change to listen and learn without the "baggage” of pre-existing opinions.

Read More [fa icon="long-arrow-right"]

10 Ways CIOs & CISOs Can Beat Talent Crunch in Information Security

[fa icon="calendar'] Jun 15, 2016 2:18:12 AM / by Anupam Bonanthaya posted in Cybersecurity, Information security, Security, talent, SOC, security analytics, security services, hiring, infosec, managed security

[fa icon="comment"] 0 Comments


Information Security has jumped 33% to become Top-3 Priority for IT Executives in 2016. Now with the increasing importance of information security to organizations, the biggest hurdle is no longer buy-in from the board or even the budget $ - It is the "availability of talent" !

Information Security professionals are on the top when it comes to talent crunch. In this article I will cover 10 ways to deal with the talent shortage you are facing today. 

Read More [fa icon="long-arrow-right"]

4 Immediate Changes to make Traditional Vulnerability Management to Work

[fa icon="calendar'] Jun 2, 2016 8:05:00 AM / by Amit Ranjan posted in Cybersecurity, Vulnerability management, Vulnerability Intelligence, zero day, security analytics, vulnerabilities, cyberthreat, infosec, vulns

[fa icon="comment"] 0 Comments


We all know that traditional find and fix practice of vulnerability management has many challenges, and as a result is not really equipped to do a good job of managing exploits in today's information security scene. 

In this article I want to talk about the 4 things you should do in order to make it work better.

Read More [fa icon="long-arrow-right"]

Time to Re-think Vulnerability Management ? These 5 Facts Say So...

[fa icon="calendar'] May 24, 2016 11:50:53 PM / by Anupam Bonanthaya posted in Cybersecurity, databreach, Vulnerability management, Vulnerability Intelligence, security analytics, vulnerabilities, cyberthreat, infosec, vulns

[fa icon="comment"] 0 Comments


Do you know what is the most predictable trend in Information Risk Management ?

It is vulnerabilities. If you review data breach reports from the last few years, you will notice one thing that is very consistent and it is about the vulnerabilities!  The only change is that things have become worse over the years, and looks like the trend will continue.

Does it say something about our approach to managing vulnerabilities?  Perhaps!

So are we missing something? Perhaps!

In this post I have pulled out 5 trends that I feel clearly indicates that the current approach of vulnerability management is not working, and it is time to re-think our approach.

Read More [fa icon="long-arrow-right"]

13 Different Phishing Tactics and 1 Way to Prevent It

[fa icon="calendar'] Apr 20, 2016 1:14:51 AM / by Anupam Bonanthaya posted in Social engineering (security), fail-rate, Cyber Security, hackers, databreach, fall-rate, Information security, Malware, Vulnerability management, Security Trends, ransomware, Security, phishing, hacking, infosec

[fa icon="comment"] 2 Comments

 

Phishing Attacks are no longer that TOO GOOD TO BELIEVE - you have won a Million $$ jackpot kind of emails from strangers that easily stands out from your otherwise mundane life.

Today, phishing emails have got sophisticated. It is called spear phishing where the attacker tries to "custom-write" the emails to make it believable to you. They try to copy our (normal) life, and that's where it gets interesting and scary at the same time.

23% of recipients now open phishing emails and 11% click on attachments. and nearly 50% of this happens within 60-minutes of the attack !

- 2015 Data Breach Investigations Report (DBIR group)

Let me share a personal experience.

Read More [fa icon="long-arrow-right"]
     

Other Popular Posts

Subscribe

Case Studies