Mitigating Data Breaches with ALESA

Question: Aside from eliminating sensitive data from your business process, what are two things you can do to eliminate much of the risk of a data breach? Answer: Application-Level Encryption and Stro...
Read more

Lessons For IT Professionals From Prominent Security Breaches

Ask a security professional what the acronym "CIA" in data security expands to. If you get the response "confidentiality, integrity, availability," then you'll get an indicator of why the state of cyb...
Read more

Twitter Hack in Bitcoin Scam Reveals Fundamental Security Flaw

Back in July 2006 when Twitter, then known as Twtrr, was unleashed onto the unsuspecting public, the world was a simpler and gentler place. President Bush rolled out an anticipatory in case Flu Pandem...
Read more

The Striking Parallels of the Firewall and Blockchain

Thirty years ago, as a U.S. Department of Defense experiment called the internet was to be soon commercialized, companies started to focus on how to protect internal systems and applications from atta...
Read more

How to Fight Breach Fatigue

The phenomenon becoming known as "breach fatigue" represents a warning against complacency with regard to the prevalence and success of data breaches.
Read more

Capital One: Chronicle of a Data Breach Foretold

The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit card applications at Capital One. The story hit headlines for months, and with much reas...
Read more

Sharing Isn't Caring

Comfortable Breaches to Fit Any Lifestyle Do you travel? Do you prefer to drive or fly? Do you have a favorite hotel chain? Use the same entertainment methods from day to day? How long have you had th...
Read more

Cloud Vector – Cyber Illness, Infection, and How to Contain Them

Infectious Humour Humans have long had strong emotions about the sick, infirm, and deformed. The word monster derives from the Latin word for omen, originating from a time when sick and deformed child...
Read more

A Deduction of Errors

Hacking by Design As early as 1994, the concept of security by design was beginning to take shape; anticipating malicious intent and incorporating designs to circumvent or altogether exclude scenarios...
Read more

Self-Worth: the Cost of Identity

The Weighted Scales of Justice In 2012, BlueCross BlueShield (BCBS) of Tennessee paid $1.5M to cover the 2009 breach of 1 million patients’ data—about $1.50 a person. Counting the $17M spent on analys...
Read more