The Cyber Attribution Dilemma: 3 Barriers to Cyber Deterrence

Given that the most serious threats in cyberspace are other state actors and their proxies, traditional thinking is focused on deterrence. Yet there are significant challenges for cyber deterrence. The concept of deterrence was originally developed during the rise of nuclear technology. It relies on second-strike capabilities of opponents and…

Read More

There Is No Perfect Time to Tackle Security Tasks, So Don’t Wait Until It’s Too Late

When it comes to security program management, time is of the essence. Threats need quick attention, incidents require rapid response and confirmed breaches must be dealt with promptly. Less urgently — but equally crucially — security teams must complete vulnerability and penetration testing, remediate issues uncovered during previous assessments, and…

Read More

4 Ways to Overcome the Cyber Workforce Shortage

As 2018 draws to a close, the state of the cyber workforce can be summed up in two words: “Help Wanted!” The numbers prove it: In November, the National Institute of Standards and Technology (NIST) released updated workforce numbers through its CyberSeek security jobs heat map. According to NIST, there…

Read More