Given that the most serious threats in cyberspace are other state actors and their proxies, traditional thinking is focused on deterrence. Yet there are significant challenges for cyber deterrence. The concept of deterrence was originally developed during the rise of nuclear technology. It relies on second-strike capabilities of opponents and…
Read More
When it comes to security program management, time is of the essence. Threats need quick attention, incidents require rapid response and confirmed breaches must be dealt with promptly. Less urgently — but equally crucially — security teams must complete vulnerability and penetration testing, remediate issues uncovered during previous assessments, and…
Read More
5G is just around the corner. With its blazing fast speeds and lower latency, the way we use technology is bound to change forever and in every way. As these fascinating developments unfold, security will have to undergo significant changes as well. But will the arrival of 5G technology be…
Read More
As 2018 draws to a close, the state of the cyber workforce can be summed up in two words: “Help Wanted!” The numbers prove it: In November, the National Institute of Standards and Technology (NIST) released updated workforce numbers through its CyberSeek security jobs heat map. According to NIST, there…
Read More