Blog

Blog

Top Security Tips for your Wordpress Website

Whenever you talk about WordPress security, every gig hands you a list of security plugins. My point of view and approach are different. I am not saying that using security plugins will not provide you efficient security. All I am saying is that only using security plugins will not completely secure your website. You have to take actions out of the...
Blog

Why We Need More Women in Cyber Security

Women currently represent only 11 percent of the cyber security workforce worldwide. This statistic is cause for alarm because it’s a key factor in the massive talent shortage that is impacting this crucially important field. It is estimated that, as of now, there are 1 million unfilled cyber security jobs—and that number is growing fast. This...
Blog

Making Sense of the General Data Protection Regulation (GDPR)

The upcoming GDPR compliance deadline of May 2018 affects any organization across the world that collects, processes, or stores data on citizens of the European Union. The intent behind the GDPR is to better protect the privacy of EU citizens, and the mechanism to do so is through harmonizing the existing data privacy laws across Europe. “The six...
Blog

Disclosing Zero Days

Governments ought to disclose zero-day vulnerabilities and begin to collaborate to make digital disarmament more than just ‘a thing.’ The case for these policy changes is becoming increasingly clear as new public debates begin to take shape around online privacy, trust and the prevention of cyber conflict. However, much work lies ahead in correctly...
Blog

Women in Information Security: Lesley Carhart

The cybersecurity industry can be made stronger if we attract more women and non-males. I've had the pleasure of interviewing some in my series. I spoke to Dr. Jessica Barker, who advises organizations on information security and maintains a blog at Cyber.uk. Then I spoke to Emily Crose, a network threat hunter. Most recently, I had the opportunity...
Blog

The Human Factor: Technology Changes Faster Than Humans

The title of this piece is quite obvious, but it is also an unappreciated fact. Consider for a moment the change we have seen over the last 30 years: access to cyberspace was scarce, often limited to enterprise users such as governments, educational institutions and the largest corporation, whereas today, there are billions of users that treat the...
Blog

The Top 5 Vendor-Neutral Cloud Security Certifications of 2017

Many organizations migrate to the cloud because of increased efficiency, data space, scalability, speed and other benefits. But cloud computing comes with its own security threats. To address these challenges, companies should create a hybrid cloud environment, confirm that their cloud security solution offers 24/7 monitoring and multi-layered...
Blog

5 Tips for a Winning Security Project Business Case

Make no mistake: just like watching a perfect ballet performance, success is attributed to the hard work done behind the scenes. Only the best are chosen. The same goes for preparing and submitting a security project business case. Securing funding for a security project starts with a credible and comprehensive business case that not only justifies...
Blog

Using Smart Meters as a Digital Attack Vector

Even if you’re not in the utility industry, it’s hard to ignore the slow march forward of the smart meter. The days of a utility employee stopping by to check the meter are well on their way out. In fact, it’s hard to imagine a system that relies on someone physically showing up to check the meter at all. Today, smart meters go beyond simply...
Blog

Google is building an ad-blocker into Google Chrome, report claims

When the world's biggest online advertising platform is reported to be working on a technology to block ads in the world's most popular browser, it's no wonder that some eyebrows will be raised. According to a report in the Wall Street Journal, Google is planning to build an ad blocker into Google Chrome. The feature, which would be turned on by...
Blog

Met Police Database of 30,000 Gun Owners' Data Used for Marketing Campaign

London gun owners want to know if the Metropolitan Police shared a database containing 30,000 firearm registrants' information with a marketing firm. On 18 April, 5,000 rifle owners and 25,000 shotgun owners living in London received a leaflet in the day's mail. Titled "Protect Your Firearms and Shotguns with SmartWater," the leaflet urges the...
Blog

The Human Factor: Cybersecurity’s Forgotten Conversation

In any conflict, humans are impacted. In conflict, the best scenario is that the individual leaves unscathed and perhaps even unaware of what could have been their misfortune, whereas in the worst of cases – such as kinetic warfare – the impact can be the ultimate price: loss of life. There is also a cruel truth of conflict that often gets looked...
Blog

Cyber Security in Canada's Schools: An Interview with Benjamin Kelly

Cyber security is a priority for every country in today's world. Canadian educators are among those who understand this fact. This explains why some of Canada's teachers are creating programs designed to foster students' interest and skills in the field. We at The State of Security are enthusiastic about these new cyber security educational programs...
Blog

How Universities Can Help Fill the Security Skills Gap

The world is currently experiencing a serious cyber security talent shortage that is having profound effects on businesses and governments alike. An alarming number of cyber security/information security professionals surveyed for ISACA’s State of Cyber Security 2017 report (37 percent of 633 respondents) said fewer than 1 in 4 job applicants...
Blog

Conference Passes – Cyber Security Merit Badges

What is the first thing you do upon returning from a conference, seminar, or other event? Quickly update your LinkedIn network with new contacts from the event? Draft a presentation that you promised as part of the business justification to attend the conference? Prioritize a list of products you want to implement, and why? Me? I add my latest...
Blog

Women in Information Security: Emily Crose

Previously, I interviewed Dr. Jessica Barker. She's a woman who runs a firm, J L Barker Ltd., where she advises many British organizations on how to handle information more securely. Now, I'm honoured to talk to Emily Crose, a network threat hunter. I discovered her on Medium, where she wrote a thought-provoking article about the differences in her...