Blog

Most cybersecurity professionals worry that their security initiatives are not up to snuff. And they're probably right. Based on the Nemertes 2016/2017 Cybersecurity Benchmark and Maturity Model, for which we interviewed some of the best and most successful enterprise security firms in the world, many...

Eight principles characterize companies using technology for true transformation. Digital transformation initiatives are in full swing at nearly 70% of companies. But the extent of those initiatives--and their level of success--varies greatly. Nemertes Research recently completed a detailed study to evaluate digital trends and best practices among...

Most information security professionals are pretty good at assessing technical risks, and remediating against them. The problem is that such an approach isn't enough. They also need to think in terms of business risk--and communicate technical challenges and remediation strategies in business terms. Back in 2014,...

If you're an infosec professional, you're probably pretty up to speed on ransomware. But do you have the right solutions in place to protect your employees and your organization? Ransomware attacks have skyrocketed in 2016, moving beyond Cryptolocker and Cryptowall to Cerber2 (for which there is...

At times, I feel like I’ve slipped into a time warp with all the talk about digital transformation. Wasn’t “digital” a ‘70s and ‘80s thing, and “transformation” a ‘90s movement for IT? Alas, I have succumbed to the latest buzzword, but I also have found the...

Chalk me down as a believer. After nearly six months of using a team chat app, I'm hooked, and I never want to go back to email. Call it "team chat," "team messaging," "workstream communications and collaboration," or whatever else you want, apps like Atlassian HipChat,...

Unless you've been buried under a rock, if you're a security professional you already know about the "as bad as it gets" security breach in Symantec's antivirus software, which exposes Mac, Windows, and Linux machines--virtually any networked device--without requiring any user interaction whatsoever. Google's cybersecurity team--which...

There’s no arguing that WiFi is pervasive in our lives. Between the number of laptops in a home with its own wireless internet connect and the ever-increasing number of devices that rely solely on wireless, including mobile phones and tablets, the everyday user is extremely...