Author: Robert Bigman

Categories : Data Security            1Comments           

One interesting, and perhaps unique, aspect of the cyber security industry is the degree to which we can (albeit, after the fact) completely decompose a hackers attack modus operandi (by decoding their malware source-code and tracing their command and control infrastructure). Furthermore, trips to public and, more importantly, private “hackathon” events reveal that many hackers are very forthcoming in explaining and sharing the details of their hacking analytical approach, coding strategies, actual code libraries and attack scenarios.   Not too long […]

Categories : Data Security            Leave a comment           

The RSA Conference (RSAC) is over and while there, I had an opportunity to talk to a number of Chief Information Security Officers (CISOs) about their challenges, especially their ability (or inability) to address the almost daily deluge of new cyber security risks. I’m sorry to have to report that at no other time in my memory has the gulf between identifying and responding to risk ever been greater. ClickToTweet: Keeping CISOs Off The Ledge from Bob Bigman #DefenderOfData http://bit.ly/1GmaJeq […]

Categories : Data Security            Leave a comment           

One of our nations many pressing cyber security issues (that we have still made very little actual progress towards) is strengthening the collective security of our critical infrastructure Information Technology (IT) fabric. Now, I know everyone’s first response will be: “Not true, we now have a cyber security framework; an agreement between the public and private sectors regarding how to measure cyber security risk, how to discern a cyber security program’s level of influence and, most importantly, an articulation of […]

Categories : Data Security            1Comments           

It was Albert Einstein who defined insanity as: “Doing the same thing over and over again and expecting different results.” But, yet again, the Government (e.g., the Cyber Security Framework or the Federal Financial Institutions Examination Council cybersecurity vulnerability and risk-mitigation assessment) is on the compliance band-wagon to attempt to drive industry to “up-their-game” and better defend their organizations from cyber-criminals and nation-state hackers.  Within the U.S. Government administrative branch, the primary compliance mechanism is the Federal Information Security Management […]

Categories : Data Security            Leave a comment            Tags: , , , ,

Only Suggestions and Encouragement – When we are at Cyber War All you need to know about why the presidentially directed cybersecurity framework effort by the National Institute of Standards and Technology (NIST) represents (at best) minimal progress in our war against cybercriminals and nation-state actors is summed up in the second paragraph of the summary. The framework states that: “[i]t is the Policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and […]

Categories : APT, Data Breach, Data Security            Leave a comment           

First it was RSA, then CISCO and now Adobe.  And, keep in mind, these are the companies that have publicly come clean.  There are clearly many more who either know they have been compromised-but won’t admit to it and some who simply don’t know (or don’t want to know) if they have been had.  These IT industry leaders should know better!  Treating your product source code like the cafeteria menu is not acceptable. Source code is the digital recipe that […]

Categories : Access Control, Cloud Security, Data Security, Privileged User            Leave a comment            Tags: , , ,

The Edward Snowden incident not only revealed the scope and depth of the PRISM and XKeyscore programs but also exposed a dirty little secret about system administrators who, while authorized to manage and operate computer networks, are not authorized to access sensitive data repositories. The truth is that all too often organizations place sensitive data at risk by expanding administrator access across multiple networks (i.e., trying to save money by doing more with less). This is a risky gambit. If […]