Monthly Archives: March 2019

Home/2019/March

Flipping the Script – Users Are Your Greatest Security Asset

You've heard the statistics, read the headlines, fell for the click-bait, and jumped on the bandwagon to say with conviction statements like: “More than 50% of cybersecurity incidents are due to user error”, “Users are your greatest cybersecurity weakness”, “Users are the weakest link in the cybersecurity chain” - the list goes on and on. It’s time to flip the script and understand that users are your greatest cybersecurity asset. It’s easy to simply assign blame. And the statistics are [...]

2020-04-01T21:06:58-04:00By |

Data Privacy in a Data Driven World

On January 21, 2019 The French Data Protection Authority (DPA) found a lack of transparency when it came to how Google has been harvesting and using personal data for ad-targeting purposes resulting in a fine of $57 million levied by France’s National Data Protection Commission. This is only the beginning of such penalties as governments seek to protect their citizens from ever increasing privacy infringements by companies. The European Union is leading the way in privacy law, but the US [...]

2019-03-19T18:02:12-04:00By |

Post-Quantum Cryptography in a Pre-Quantum World

In case you missed it, check out my first post on Quantum Computing at https://layer8security.com/the-future-of-encryption-in-the-quantum-realm/ -- The Quantum Computer is becoming a reality sooner than we thought - possibly in less than five years. Nation State-sponsored research from the US, China, France, and the UK are leading innovators. Major corporations such as IBM, Microsoft, Google, Rigetti, and Alibaba are releasing cloud-based access to quantum computers with coding languages being developed. Organizations such as NASA, Lockheed Martin, Royal Bank of Scotland [...]

2019-03-17T15:15:01-04:00By |

Interview with a large healthcare provider’s VP of IT

Keith Wiley, the Director of Advisory Services for Layer 8 Security, recently sat down with the VP of IT at a large healthcare provider after a major breach occurred. The following perspectives and lessons learned are meant to benefit all. -- From a leadership perspective, sometimes risk management and cybersecurity can be pushed to the side in favor of other business objectives. While it may be easy for those who have spent their entire careers working in risk management and [...]

2019-03-03T19:59:20-05:00By |