Showing Blog Posts: 1–10 of 17 by Tony Bradley

Tony Bradley

Tony Bradley


  • Encryption Rules Only Apply to Those Who Follow Them

    by Tony Bradley on January 18, 2016

    The world can be a dangerous place, and nations around the world must be vigilant to identify and prevent attacks from would-be terrorists. In the wake of recent terrorist attacks in Paris and in San Bernardino, Calif., there has been increased debate over the need for intelligence agencies to have some sort of back-door access to enable monitoring of encrypted data and communications. It’s an…

  • Today’s ‘Unbreakable’ Encryption Is Tomorrow’s Security Weakness

    by Tony Bradley on January 8, 2016

    We hear a lot about encryption as a magic silver bullet solution that will secure and protect our data. Businesses and consumers are directed to employ encryption wherever possible, and in the wake of any data breach one of the first questions that comes up—often from encryption vendors with a marketing agenda—is whether the compromised data was protected with encryption. Encryption evolves over…

  • Why a Code Freeze Is a Cybercriminal’s Best Friend

    by Tony Bradley on December 17, 2015

    As we wind down 2015 and businesses prepare to shut down for the extended holiday break, many will also implement a code freeze. The code freeze is a normal operating procedure that occurs regularly as an application or software update nears release, or whenever there’s a crucial business milestone—like end of quarter or end of fiscal year. Unfortunately, a code freeze also means that…

  • Protecting a Ghost Town: How Stay Secure When Your Staff is on Vacation

    by Tony Bradley on December 15, 2015

    The doors are locked. The lights are off. All through the office not a creature is stirring, not even a mouse. Well, one can hope at least. In a few weeks that's how most organizations will look. Business will all-but-cease and many employees will be home celebrating the holidays with family and friends. Hackers, cybercriminals, and malware, on the other hand, will be putting in extra hours to…

  • How to Enjoy the Holidays in Peace (While Keeping the Network Secure)

    by Tony Bradley on December 10, 2015

    I’m not sure why we even bother showing up to work in the month of December. The first week is spent coming down off of the Thanksgiving-gluttony food coma and frantically shopping online during work hours to find holiday gift bargains. We show up for the next two weeks because of a mandatory requirement to be physically present (even though you’ve already mentally checked out) and you’re just…

  • Think Security Is Expensive? Insecurity Costs Much More

    by Tony Bradley on October 23, 2015

    Security has come a long way over the past decade. It is still the red-headed step child of the business units but at least most organizations have some sort of CSO or CISO role in place and do a good job feigning support for security. Businesses that focus on squeaking by spending as little as possible on security, though, are bound to find out the hard way just how expensive a lack of security…

  • Why It Costs More to Protect Your Virtual Infrastructure

    by Tony Bradley on October 19, 2015

    Security incidents are expensive, but not all security incidents are created equally. A recent study found that businesses pay a significant premium for incident response and recovery affecting a virtual infrastructure. Respondents representing more than 5,500 different companies across 25 different countries participated in the survey. The purpose of the survey was to learn more about the cost of…

  • How Much Will That Phishing Trip Cost You?

    by Tony Bradley on September 29, 2015

    Organizations spend a significant amount of money on security tools. All of the firewalls and antimalware solutions in the world, though, offer little protection against a phishing attack that tricks an authorized user into downloading malicious software or compromising credentials. Phishing attacks are becoming more effective and more costly as time goes on. The Ponemon Institute recently…

  • You Can’t Squeeze Blood From a Turnip

    by Tony Bradley on September 23, 2015

    You’ve probably heard the phrase “You can’t squeeze blood from a turnip,” before. The point is that no amount of begging, coercing, pushing, or otherwise coaxing something can yield results if those results simply aren’t possible. Many organizations, however, hand a proverbial turnip to the CISO and expect blood in return. Executive management or the company board have expectations for the CISO. …

  • What Do Companies Expect From a CISO?

    by Tony Bradley on September 15, 2015

    The role of CISO is an important one. It must be. It has Chief right in the title. The question, though, is what exactly does a company expect a CISO to do? You can’t meet or manage expectations if you don’t know what they are, and there’s a good chance you won’t keep your CISO job very long if you can’t meet expectations. A CISO is responsible for securing and protecting information assets but…

This document was retrieved from on Mon, 24 Oct 2016 08:23:00 -0400.
© 2016 EMC Corporation. All rights reserved.