- Leadership Know Your Firm's Economic Moat to Keep Security Relevant
Effective security decisions require understanding your company's economic moat—the competitive advantages that protect it from rivals. Framing risks in terms of threats to these moats (brand equity,...
- Malware Malware: Whom or What Are We Fighting?
Malware is a tool used by people to achieve objectives—security professionals aren't fighting the software itself but the individuals, companies, and nations behind it. Understanding the larger...
- Risk Management The Eternal Cycle of Cybersecurity
The fight between cyber attackers and defenders resembles an ecological cycle between predator and prey—the goal is equilibrium, not victory. Being complacent is risky because maintaining balance...
- Career Security Trends and Your Career Plans
Information security trends like operationalization, hypersegregation, and active defense create opportunities for both IT operations and security professionals. Operations personnel can expand into...
- Authentication What to Do About Password-Sharing?
Password sharing is a reality driven by convenience and social norms—Netflix even encourages it with multiple profiles per account. Rather than pretending credential sharing doesn't exist, products...
- Authentication Potential Security Applications of the iPhone 5S M7 Motion Coprocessor
The iPhone 5S M7 motion coprocessor could enable continuous authentication by identifying users through their unique walking patterns. This approach would be more seamless than traditional PIN entry...