Navigating West Africa’s Worsening Security Climate

by Jesper Cullen

The threat of terrorism in West Africa appears to be growing, creating concerns about whether it is safe to do business there. The Risk Advisory Group – a global risk management consultancy – is...

The Threats are Here Today: Vulnerabilities in Industrial Control Systems

by Angie Messer

Industrial control systems (ICS) underlie a vast number of different processes, from manufacturing to energy production to public transit. As these systems become more advanced and more connected,...

The Effectiveness of Bug Bounty Programs

by Michael Taylor

As hackers continue to grow more sophisticated, many firms are struggling to find ways to ensure that their systems are secure. In support of that goal, some have found a measure of success with bug...

Networked Medical Devices at Risk

by Kurt Roemer

Networked medical devices are becoming steadily more common, and they are making things easier for both patients and healthcare providers. However, there is an accompanying risk of attack from...

Counterintelligence for U.S. Companies Operating Abroad

by Sarah Morningstar

In January, the CEO of American Superconductor publicly detailed how traditional economic espionage methods carried out by a small Chinese firm resulted in over a billion dollars in loss to his...

Shadow IT & Cloud Access Controls

by Doug Cahill

The “consumerization of IT,” a term coined in the early 2000s with origins dating back to the introduction of the personal computer, continues to be manifested in corporate computing in a...

Insider Threats: A Big Data Problem for Big Defense

by Jonathan Berliner

Stranded during a historic Washington-area blizzard in February 2010, a U.S. soldier embarked on a mission that he had sworn to not fulfill: “…I joined in on an IRC (Internet Relay Chat)...

Government vs. the Evolution of Encryption

by Dan Kruger

On March 11, President Barack Obama said that smartphones can’t be allowed to be “black boxes,” inaccessible to the government.  It is apparent that the government does not understand...

Government vs. the Evolution of Encryption

by Dan Kruger

On March 11, President Barack Obama said that smartphones can’t be allowed to be “black boxes,” inaccessible to the government.  It is apparent that the government does not...

Endpoint Security Management

by Doug Cahill

Do you bring your own laptop to the office, or does your phone connect to your company’s Wi-Fi network? If so, then you need to be concerned about endpoint security. The rise of...