16 days ago

TIP of the Iceberg: Research Announcement on Threat Intel Platforms

A common feature in the threat intelligence platform (TIP) space is aggregation of data and providing an interface for managing threat intelligence — this seems to be where the product visions diverge. While many of these platforms have been arou…

1 month, 20 days ago

CSI: Your Network – Reconstructing the Breach

September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]

2 months, 6 days ago

Forrester Gathers Experts Across Disciplines To Tackle Europe’s Most Pressing Privacy, Security, and Trust Challenges

Fresh off a successful event in Washington, DC last week, we’re gearing up for Forrester’s Privacy & Security Forum Europe in London on 5-6 October. Forrester is gathering experts in cybersecurity, privacy, customer experience, regulatory compliance, identity management, personalization, blockchain, and a range of related topics.  Together, Forrester analysts and leaders from firms like ABN […]

2 months, 17 days ago

Equifax Does More Than Credit Scores

Our reaction to the Equifax breach was similar to what we imagine many people went through. First, we wanted to know if we were affected? Second, What about our spouse and other immediate family members? Third, Better keep an eye on the old credit report or initiate a credit freeze. Since Forrester offers credit monitoring […]

3 months, 4 days ago

Customer Trust And Loyalty Determine Success On The Dark Web, Too

  This is a guest post by Salvatore Schiano a researcher serving Security & Risk Management professionals The dark web is an underground marketplace for drugs, stolen credentials, stolen financial and medical records, and other illicit products and services.  Cybercriminals use it to monetize breached data but they also use it to buy and sell exploits […]

3 months, 7 days ago

You Deserve What You Tolerate…

After reading through some other blogs and strategy papers over the weekend, (Don’t judge me. To some of us, this activity constitutes a good time…Yes, lame…I know.) I saw what appeared to be an underlying theme across the narratives I’d read: Security tolerates failure. It’s understandable that it happens, but I think, if we are […]

4 months, 1 day ago

Black Hat Buzzword Bingo 2017

Every year at Black Hat, the buzzword factory is in full swing.  Last year the word of the day was Artificial Intelligence or Machine Learning (or in the off chance you met with someone who knew what they were talking about they would call it “AI or ML”).  The year before that, the word of […]

2 years, 7 months ago

Survey Shows Organizations Are Experiencing an Identity Crisis When it Comes to IT Risk Management

By Jim Hietala, VP, Business Development & Security, The Open Group Last fall, The Open Group Security Forum fielded its first IT Risk Management Survey in conjunction with the Society of Information Risk Analysts (SIRA) and CXOWARE The purpose of … Continue reading

2 years, 7 months ago

Risk, Security and the Internet of Things: Madrid 2015 Preview

By Jim Hietala, Vice President, Business Development & Security, The Open Group The Internet of Things (IoT) is a fast evolving phenomenon. From smartphones and tablets to connected cars and industrial control systems, the number of IoT devices is continuing … Continue reading

2 years, 8 months ago

Cybersecurity Standards: The Open Group Explores Security and Ways to Assure Safer Supply Chains

Following is a transcript of part of the proceedings from The Open Group San Diego 2015 in February. The following presentations and panel discussion, which together examine the need and outlook for Cybersecurity standards amid supply chains, are provided by … Continue reading