• Jul 18
    2017
    What affects the cost of a data breach? As I noted in this blog post a couple weeks ago, the 2017 Cost of Data Breach Study: Global Analysis identified half a dozen contributors: unexpected and unplanned loss of customers (churn rate) number of records lost (the more records lost, the higher the cost) post-breach costs, including the costs of victim notification whether the incident results from an attack or negligence ...
  • Jul 11
    2017
    If your experience is anything like mine, you don’t have much respect for the average spammer. The messages are so crude and so easy to see through that it’s a wonder any of them ever succeeds. Do they really think I might believe a message with the subject line “No Diet Or Exercise, AND Still Lose Weight” or “#1 Weird Trick To Pay $7 Month On Electricity”? I saw some ...
  • Jul 05
    2017
    The 2017 Cost of Data Breach Study: Global Analysis has been released, and you can download it here (registration required). Sponsored by IBM and performed by the Ponemon Institute, this year’s study suggests that cybersecurity may be improving: The average cost of data breach decreased 10 percent and the per capita cost decreased 2.9 percent. However, the average size of a data breach (number of records lost or stolen) increased ...
  • Jun 27
    2017
    Last November, TEKsystems, an IT staffing firm, released the results of a survey of IT leaders in which more than half (53%) of the respondents said their organizations had no formal strategic workforce planning strategy. Nearly three-quarters (73%) don’t begin workforce planning for an IT project longer than three months before the project kicks off. It is probably no coincidence that the survey also found more than two-thirds of respondents ...
  • Jun 21
    2017
    Here are three ideas for protecting your organization against cyber threats: Use big data analytics on your logs, flows, and telemetry to identify attacks and detect threats. Get top management involved in taking a proactive approach to cybersecurity. Protect your organization against half of all cyber security risks by acting to eliminate insider threats. As it happens, those ideas (and others) will be the subjects under discussion in the keynote ...
  • Jun 13
    2017
    If you’ve ever taken a trip to Paris and found your two years of undergraduate French to be utterly useless, you have encountered the training transfer problem. Your French classes may have been excellent and your teacher dedicated, but once you left school (or even the course), the environment encouraged skills decay. The transfer of training, i.e., the application of new skills back on the job, depends more on post-training ...
  • Jun 06
    2017
    The other day, I did a web search on the string “wannacry wake up call” and got “about 1,180,000 results.” The conventional wisdom, then, is that the Wannacry attack is a danger signal to which we need to pay attention. This is a case in which the conventional wisdom is right on target. Let me offer a quick review of the disaster, based on its entry at Wikipedia. The attack ...
  • May 30
    2017
    When I was a child in school, the learning process was all about eliminating distractions. Today, we are more likely to use “distraction” to make learning easier or stickier. If you were to take a course using our Logical CHOICE platform, for example, you would probably find a dozen different ways to approach your learning goals. You would find textual and graphical resources, video libraries, easy access to your classmates, ...