Beth Ruck

Recent Posts

From Honeypots to Endpoint-Based Deception: Deception Becomes a Cybersecurity “Must-Have”

Posted by Beth Ruck on Dec 7, 2017 8:22:48 AM

It goes without saying that rigorous security controls are irreplaceable. But no matter how strong an organization’s cybersecurity defenses are, determined attackers will still get in. Whether malicious insiders or external actors, persistent attackers fly below the radar and reside for months inside a network. They’re patient, studying the infrastructure and carefully planning their attack because what they’re typically after are the crown jewels of your business: essential data volumes, intellectual property, financial transactions, or revenue-dependent business operations.

Read More


Putting Everyone to Sleep by Measuring APT Risk

Posted by Beth Ruck on Oct 3, 2017 2:19:08 PM

The risk of an Advanced Persistent Threat (APT)—the possibility of an advanced cyber attacker moving under cover in an enterprise network—keeps CISOs awake at night. But it's making more C-level executives and their board members restless, too, because of the potentially massive damage advanced attacks can cause to business reputations, critical systems, data manipulated or stolen and operations compromised. Boards and senior execs are demanding better accountability and assurances that their organizations are adequately protected.

Read More


Doing Our Part to Narrow the Cyber Talent Gap

Posted by Beth Ruck on Aug 10, 2017 7:00:38 AM

The second and third most common inhibitors to better cyber defense, according to the 2017 Cyberthreat Defense Report are “the shortage of skilled personnel and too much data for IT security teams to analyze.” The two are undoubtedly related.

Read More


Trying to Lower the Cost of Data Breaches? Address the Detection “Lag”

Posted by Beth Ruck on Jul 27, 2017 9:30:23 AM

By annually tracking the cost of data breaches, Ponemon Institute has helped instill broad awareness that these costs continue to increase. As noted in our report earlier this year, Ponemon also offers some insight on steps companies can take to minimize these costs, citing the positive impact of investment in pre-established incident response teams, employee training, and enhanced encryption.

Read More


Deception Technology - an Attacker’s Achilles Heel

Posted by Beth Ruck on Jul 6, 2017 1:57:52 AM

Deception technologies fundamentally change the way we face cyberthreats. Advanced attackers know that the weakest link in any security chain is usually a human being. But the reverse is also true: deception technologies leverage the fact that advanced attackers are human, too. 

Read More


Stay up to date!

Popular Posts

  

> Share Post