Necessity is the Mother of Innovation

This phrase first appeared in English in the 1600s, and versions exist in French, Italian, German, and many other languages – so the concept is not new. In fact, the ancient Greeks had a similar saying. Innovation is part of human nature: when we see a problem, we look for a solution. Solving one problem frees us to focus on other problems that were overshadowed by the first — innovation is never ending. The pandemic has presented numerous opportunities for humans to innovate, especially in the area of information technology  Read more

Laboratory or Museum?

Laboratories are dynamic. New instruments are added regularly to enable new tests. Space is reconfigured to adapt to new ways of doing things. Once something is no longer useful, it is removed and replaced with something better. Museums are static. Their purpose is to preserve the past. Even when new exhibits are added, they look backward, not forward. Read more

How Could You Let This Happen?

Those are words we never want to hear, no matter what the situation. Something undesirable has happened, we were expected to have prevented it, but it happened. By the time the question is being asked, there isn?t much to do except damage control.

When it comes to information security, sadly, this question is asked all too frequently. Attackers continue to refine their skills while, at the same time, more and more aspects of business are being digitized and moved online. If you don?t have a robust and constantly improving security posture, sooner or later you?re going to hear those words directed at you.

In the previous blog post, Make vs. Buy, we discussed the economic tradeoffs of investing in internal expertise versus leveraging external expertise. Maintaining effective information security is like running on a treadmill that doesn?t have a stop button?if you aren?t constantly moving forward it?s going to get ugly real fast. Staying up to date on the latest security trends, vulnerabilities, and solutions is a full-time job, and when you factor in PCs, phones, servers, networking gear, and other technologies, more than just one person can handle.

Read more

Make vs. Buy

If you?ve taken a class or read a book on business strategy, you?ve likely come across the ?outsourcing decision?. In this decision, a business compares the costs and benefits of producing a part or service internally versus the costs and benefits of paying someone externally to do it. For this decision to be accurate, all the associated costs and benefits need to be factored in. One of the hardest variables is the opportunity cost ? what new product or service can my business not develop because it?s busy working on something else? Read more

Halt 70% of Known Network Cyberattacks and Phishing Campaigns

As the shelter-in-place (SIP) rages on within California, the Bay Area and its workers are forced to continue working remotely. At times, it feels like our world has drastically changed. Despite how mixed up everything may seem, it appears to be business as usual for robocalls, scammers, and hackers.

Known to the cybersecurity landscape as a ?lateral movement? or ?lateral attack,? the breach and move attack method has become a favorite for hackers today. These attacks will typically target business supply chains, in hopes of gaining access to their desired end target. One of the more famous lateral attacks was in 2013 when the department store Target was breached by hackers. The hackers were able to infiltrate Target?s HVAC System Software. From there they were able to travel within the network and steal credit card data from unknowing customers. Read more