Blog

If you're active in the cybersecurity field, chances are you've seen, heard, talked about or experienced the paucity in trained cybersecurity professionals. Predictions vary, but Cisco estimates there will be a global skills shortfall of around 2 million by 2019; other estimates are even highter...

Vidyo's announcement yesterday of a Video Platform-as-a-Service offering reflects a growing change in how enterprises and service providers can deliver communications services like voice and video. Gone are the days when using UC services required dedicated desktop and mobile applications. Now, thanks to APIs, and...

My morning cybersecurity alert scan uncovered this gem by CPA Joel Lanz on how to budget for cybersecurity. He makes a lot of excellent points. My favorite is being able to document that you've deployed, used, and benefitted from your previous investments in cybersecurity technology. Many...

I recently read an extremely provocative article on the topic of what information major providers--including Microsoft, McAfee, and others--are routinely capturing from their customers. Some of it may appear benign, and the article is focused on consumers, who bear the brunt of the information exposures. The companies...

Earlier this week I wrote about steps that infosec managers can take to protect enterprise organizations against ransomware. Today, I'd like to focus on the third of those steps: Employee education. A reminder: Ransomware isn't a trivial problem. A study by Kaspersky Labs found that 42% of...

There's a great recent piece in BankInfo Security on "the top four questions the board should ask the CISO". I like it because not only is it insightful, but it also serves as a fantastic advertisement for Nemertes' services. Lest anyone forget, we are in the business...

Most cybersecurity professionals worry that their security initiatives are not up to snuff. And they're probably right. Based on the Nemertes 2016/2017 Cybersecurity Benchmark and Maturity Model, for which we interviewed some of the best and most successful enterprise security firms in the world, many...

Eight principles characterize companies using technology for true transformation. Digital transformation initiatives are in full swing at nearly 70% of companies. But the extent of those initiatives--and their level of success--varies greatly. Nemertes Research recently completed a detailed study to evaluate digital trends and best practices among...

Most information security professionals are pretty good at assessing technical risks, and remediating against them. The problem is that such an approach isn't enough. They also need to think in terms of business risk--and communicate technical challenges and remediation strategies in business terms. Back in 2014,...

If you're an infosec professional, you're probably pretty up to speed on ransomware. But do you have the right solutions in place to protect your employees and your organization? Ransomware attacks have skyrocketed in 2016, moving beyond Cryptolocker and Cryptowall to Cerber2 (for which there is...

At times, I feel like I’ve slipped into a time warp with all the talk about digital transformation. Wasn’t “digital” a ‘70s and ‘80s thing, and “transformation” a ‘90s movement for IT? Alas, I have succumbed to the latest buzzword, but I also have found the...