A Beginner’s Guide to Encryption

It should come as no surprise that in this modern era of digital data we need encryption. But what exactly is it? How do you know what kind of encryption you need? If you were to ask someone what kind of encryption they use, they may respond with a specific encryption-based product, like full-disk encryption. Or they may mention an encryption-based protocol, like HTTPS (HyperText Transport Protocol over SSL). But encryption is much more complicated than that.

Read more

How Thinking Like a Hacker Can Make You More Secure

Our computer systems and networks contain quite a bit of private and often very valuable data, and we do everything within our power (and budget) to protect this data from unauthorized access. But how do you know that your security is working? How can you be sure that hackers, also called “Threat Agents,” aren’t able to bypass your security controls and access your confidential information? We can gain more confidence in our security policies and controls by changing our perspective. This requires thinking like a hacker.

Read more

A Brief Look Into the Investment Economics of Cybersecurity

There has been a lot of discussion among chief information security officers (CISOs) about the “right number” to invest in cybersecurity. It’s a hot button topic with few signs of waning. Unfortunately, there is no hard and fast rule for this type of investment due to various factors. If only it were as simple as a percentage, dollar amount or range. Let’s take a closer look at why it’s hard to find a “magic number” for cybersecurity investment.

Read more