CBI Blog

CBI Blog

Finding Threats on Your Network: Hunt or Be Hunted

Posted by Tony Bradley on Jun 8, 2016 3:31:56 PM

Guest Author: Tony Bradley
Originally Published: 5/5/2016

Is your network secure right now? Have any of your PCs or mobile devices been compromised? Before you even attempt to answer these questions, you need to pause and ask yourself: Can you actually answer either of these questions with any degree of certainty? Think hard about that one—because your job may depend on it.

Read More

Topics: Compliance, data breaches, IT Security, Network Security, Tenable, Vulnerabilty

Five Steps to Get Started with Securing ICS

Posted by J Wolfgang Goerlich on Feb 23, 2016 11:22:15 AM

Operational Technology (OT) is the equipment that provides direct control and monitoring of physical equipment, in support of operations. Operational teams cover technologies that we usually consider outside the scope of IT security, examples include: Internet of Things (IoT) devices, manufacturing equipment, and Industrial Control Systems (ICS).

Read More

Topics: IT Security, Industrial Control Systems, Operational Teams, CIP, IoT, NERC

Fixing the IT Security Talent Gap - CBI Academy

Posted by Steve Barone on Dec 2, 2015 7:59:42 AM

Saying the IT security sector is hot right now is a vast understatement. The market is growing at an incredible pace and companies are struggling to find professionals to fill seats. Unfilled seats mean increased risk and a higher chance of employee burnout due to the increased workload. Lack of talent is a real issue.

Read More

Topics: CBI, Steve Barone, hiring, IT Security, Training, Careers, CBI Academy

Securing The Development Lifecycle

Posted by J Wolfgang Goerlich on Sep 30, 2015 7:22:00 PM

One line. Ever since the Blaster worm snaked across the Internet, the security community has known that it takes but one line of vulnerable code. Heartbleed and iOS Goto Fail made the point again last year. Both were one line mistakes. Even the Bash Shellshock vulnerability was made possible by a small number of lines of code.

Read More

Topics: IT Security, HP Fortify, HP Fortify On Demand, software development lifecycle, code, Application Management

2015 Symantec Threat Report – Analysis and Commentary

Posted by John Beeskow on May 7, 2015 9:06:00 AM

Trends to Guide Your IT Risk Management Roadmap

Symantec has published their 20th Internet Security Threat Report , it’s a summary of the threat landscape over the previous 12 months, highlighting trends in vulnerabilities, breaches, and cybercrime. Additionally, new areas of focus for information security leaders and business executives are highlighted to raise awareness for the next year. You can get more details on the report and a copy of the full report here. This is an excellent report, and one that I highly recommend you take a few moments to review. Trends that stood out to me within the report include:

Read More

Topics: Symantec, Compliance, cybersecurity, IT Security, Network Security, IT Risk Management

Would you like to Contact Us?

Subscribe to CBI Blog Notifications

Connect with a Cyber Security Expert