- Risk Management Cyber Warfare Encompasses Only Some Security Concerns
Cyberwar discussions focus on mega breaches, but thousands of small breaches occur hourly and may exceed economic losses of high-profile incidents. Military cyber capabilities don't help civilian...
- Risk Management Shrinking vs. Slicing the Pie of Online and Computer Crime
Most security defenses "slice the pie"—making your target less attractive shifts attackers elsewhere without reducing overall crime. "Shrinking the pie" requires disrupting the ecosystem: stronger...
- Risk Management The Role of Rituals in Information Security
Security practices often function as rituals—painstaking steps we follow out of habit that provide a sense of control. Rituals reduce stress by overloading working memory, blocking intrusive...
- Tools Analyze Memory of an Infected System With Mandiant's Redline
Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Risk Management Herd Behavior in Cybersecurity: The Good and The Bad
The security industry exhibits herd-like behavior with both benefits and drawbacks. Higher vigilance by some allows others to focus elsewhere—good for collective defense. But anxiety is contagious...
- Leadership Limitations of Frameworks in Information Security
Security frameworks like ISO 27002 and PCI DSS provide structure, but organizations often adopt them blindly without considering applicability. Companies misinterpret prescriptive standards to suit...