-
Leadership
Do you Have What it Takes to be an Interim Manager?
Businesses, facing an ever-increasing variety of complex problems, are in desperate need of good interim managers to help solve them. Such positions are highly rewarding, with the opportunity to explore new places, meet new people – and fill your plate…
Read More » -
Cyber-Kinetic Security
The Decline of Real Penetration Testing
As the leader of Cyber Agency, one of the largest penetration testing and red teaming specialist outfis, I have a bone to pick with where our industry is headed. Back in the late 90s and early 2000s, "pentesting" actually meant…
Read More » -
Leadership
How can you get the Most out of Interim Managers?
Are you hiring and using interim managers wisely? Why is it that some companies attain exceptional results from interim manager hirings and some are disappointed? It has little to do with the quality of interim manager candidates. The only way…
Read More » -
AI Security
Testing AI in Defense – A New Kind of Security Challenge
Looking back at our engagement, I'm concerned that the pace of AI adoption in military will overtake our abilities to validate and verify such systems. If AI systems continue proving valuable, there is nothing that will stop their adoption, but…
Read More » -
Leadership
Interim Management as a Career Option
The face of interim management is changing. Traditionally, an interim manager was someone at the end of his career who chose interim management to extend his working years. This is changing fast. An increasing number of managers – both men…
Read More » -
Cyber-Kinetic Security
Polymorphic Viruses: The Shape-Shifting Malware Menace
Polymorphic viruses represent a turning point in malware history. These shape-shifting programs have shown that malicious code can be made highly adaptable, challenging the very foundations of signature-based security. We’ve examined how polymorphic malware works - using encryption, mutation engines,…
Read More » -
Leadership
What is Interim Management?
When crisis strikes your business, what can you do? As you try to pick up the pieces, at some point your mind would likely turn to the fantasy of bringing in an accomplished executive with extensive experience in the exact…
Read More » -
Cyber-Kinetic Security
Social Engineering – Greatest Information Security Risk
Social engineering doesn’t have to be just a supporting process to obtain system access; it is could be even more dangerous when it is used as the main attack. We, information security defenders, rarely consider that risk. If you think…
Read More » -
Cyber-Kinetic Security
“Zero Tolerance” to “80-20” – Lazy Approaches to Cyber Risk
There is a new danger lurking in the information assets of countless organizations around the globe disguised by a plan devised to protect a large portion of those assets while failing miserably to protect the rest. Zero tolerance approach to…
Read More » -
Cyber-Kinetic Security
Information Security is not IT Security
Information security and IT security are often used interchangeably – even among experienced security professionals. While the two terms are related and share the common goal of protecting the confidentiality, integrity, and availability (CIA) of information, there are significant differences…
Read More » -
Quantum Computing
Quantum Snake Oil
Don’t get me wrong - as a techno-geek at heart, I love the science of quantum computing. One day, it will upend cryptography as we know it. We’ll have to transition to new algorithms. That day will come - but…
Read More » -
Cyber-Kinetic Security
The Lights Are Blinking Red, and Cyber Budgets Are Blinking Off
We finally got the enterprise to look at cybersecurity. The crash slammed the door on spend just as threats professionalized and the attack surface exploded. That’s the bad news. The good news: the first 90 days of disciplined basics still…
Read More » -
Cyber-Kinetic Security
Cyber-Kinetic Attacks: Safeguarding the Physical World from Digital Threats
Cyber-kinetic attacks are not science fiction but an emerging reality, as early incidents and government exercises have shown. This paper introduced the term to crystallize the concept that digital attacks can have deadly real-world effects. We have outlined how the…
Read More »