Comments
4 Steps For Proactive Cybersecurity
Newest First  |  Oldest First  |  Threaded View
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Strategist
1/25/2013 | 10:35:56 PM
re: 4 Steps For Proactive Cybersecurity
Mr. Dittrich's blog post was extensive and thought provoking. While reading through it though, he repeatedly referenced the one critical aspect of past work and discussion on the issue which seemed to in its own way support Mr. Bardin's (CSO Online) proposal of "active defense." That is that the CISO world has been in discussion since the mid 1990s with no definitive agreement or recommended course of mitigation. Any person or company so immobilized by lack of decision as to do nothing over the course of 15 years will likely fall victim or fail. Absolute minimums then is to do the analysis, assess the risks, and don't forget to take action on the results.
dharani
50%
50%
dharani,
User Rank: Apprentice
1/23/2013 | 10:37:05 AM
re: 4 Steps For Proactive Cybersecurity
Cyber security is important in any organizations to prevent the risks of ID theft and wire fraud. Just came across an informative whitepaper on the very same topic Gǥ Wire fraud and Identity theft : Risks and prevention for Banks and consumersGǥ, readers will find it very helpful @ bit.ly/S639ew
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
1/23/2013 | 3:57:44 AM
re: 4 Steps For Proactive Cybersecurity
Very simply put - if your attacker knows more about your environment than you do, the odds are very good that you're going to be breached.

Most attackers are lazy and will go for whatever low hanging fruit is available - but once they start on the tree (i.e. your infrastructure), they'll try to pick it clean and work their way to the top.

Andrew Hornback
InformationWeek Contributor


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.