Category: CSO

Good security advice from down under

For many organizations, especially small businesses, the thought of starting any kind of cyber security program can seem daunting. With all of the threats out…

Continue Reading

Naming and shaming

So here’s a bit of an odd story… according to the Financial Times, the US Federal Reserve has publicly sanctioned an ex employee of a…

Continue Reading

So your third party has been breached…

Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed that a small number of…

Continue Reading

Open S3 Buckets: From Bad to Worse

Just when you thought that the whole “globally readable Amazon S3 storage buckets” thing couldn’t get any worse, it did. According to a study by…

Continue Reading

Outsourced security program failure leads to $100K regulatory fine

Another reminder of the importance of managing third party vendor relationships… The Commodity Futures Trading Commission fined AMP Global Clearing (an electronic trading firm) $100,000…

Continue Reading

Leaky buckets and acquisition best practices

There are three interesting things for CSOs to think about in this story on a leak of passport and other personal information on tens of…

Continue Reading

Malicious data leaks and corporate liability – a tale of two countries

Databreaches.net had a link to a very interesting article about corporate liability for an employee’s malicious leaking of employee information.  What was most striking to…

Continue Reading

Two factor authentication on web apps should be the default

tl;dr – If you are using Microsoft Office 365 (or any other hosted email solution) and have not enabled two factor authentication, you are bad…

Continue Reading

Great DerbyCon talk on hunting for the bad guys

It sometimes seems to me that a lack of data is not the issue when patrolling your networks for signs of evil badness… it is…

Continue Reading

The Practitioner’s Perspective on Cybersecurity – June 2015

On June 16th, 2015, I was privileged to participate in a panel entitled “The Practitioner’s Perspective on Cybersecurity” at the SmartBrief Cybersecurity forum, held at the…

Continue Reading