Author: Wayne Lewandowski

Categories : Data Breach, Data Breach Disclosure, Data Encryption            Leave a comment           

Einstein’s definition of insanity is doing the same thing over and over again and expecting different results. And if Einstein said it, it must be true, right? Using this definition, I would argue that many IT security professionals at U.S. federal organizations suffer from cyber insanity – and here’s why… According to Gartner, the world-wide cybersecurity market topped $75 billion in 2015, and is expected to increase to $170 billion by 2020. And of the billions spent annually on information […]

Categories : Data Security            Leave a comment           

This week, President Obama proposed a budget increase of 35% for cybersecurity spending in the overall FY2017 budget. Alongside the $19 billion ask, he also unveiled a new Cybersecurity National Action Plan (CNAP), which purports to “take near-term actions and put in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security.” In the CNAP, he called […]

Categories : Data Security            Leave a comment           

Last week I had the pleasure of attending AWS re:Invent, Amazon Web Services’ global customer and partner conference in Las Vegas. Overall the conference was characterized by a very entrepreneurial spirit, full of inventive individuals. With nearly 20,000 cloud fans in Vegas, it was bound to be a good time. ClickToTweet: 3 AWSome Takeaways from #reinvent @Wayne42675 http://bit.ly/1LclGQE pic.twitter.com/YYYtYgj9LZ As someone who has attended a fair share of trade shows, it was refreshing to see attendees express a genuine interest […]

Categories : Data Security            Leave a comment           

Last month was a big month for federal cybersecurity initiatives. With the announcement of the cybersecurity sprint results, many questions were posed by security professionals and businesses alike. The results announced on July 31 were positive and include: Federal Civilian agencies increased their use of strong authentication for privileged and unprivileged users from 42 percent to 72 percent – an increase of 30 percent since agencies last reported their quarterly data on Performance.gov. Specifically, Federal civilian agencies increased their use […]

Categories : Data Security            Leave a comment           

The U.S. as a country has a long-standing history of fighting for freedom from powerful authorities. Now, we are in a new fight: one that affects us not in a traditional manor such as a physical invasion, but one that is virtual. In light of this, we’re celebrating Independence Day in cyber fashion by sharing our thoughts on achieving cyber freedom. ClickToTweet: Encrypted We Stand,  Hacked We Fall – @Wayne42675 #DefenderOfData http://bit.ly/1Ca47jF As the flurry of breaches continues, the recent […]

Categories : Data Security            Leave a comment           

The recent tidal wave of data breaches across both commercial organizations and federal agencies has prompted scrutiny into what is being done to offset the most recent cyber attack methods. Analysts and vendors alike are prescribing what capabilities should be on the list by any good steward of the cyber assets they are protecting. The days when implementing strong firewalls, segmenting networks, locking down desktops and putting in place secure remote access to keep out attackers are gone. New technologies […]

Categories : Data Encryption, Data Security            Leave a comment            Tags: , , , ,

Just released is our latest Vormetric Insider Threat Report.  This latest report focuses on Europe, and an earlier version in September of last year detailed responses from the US.  Today, I’m taking a deeper look at the combined government data from both US and European government at a level you won’t see elsewhere. One point before I get to the results – Insider Threats aren’t just traditional insiders, people with access to sensitive data in the course of accounting, financial, […]

Categories : Data Breach, Data Security, Encryption, Privileged User            Leave a comment           

2013 started with lots of promise around cybersecurity and how the government was going to ensure that critical data running our country – from the legislative branch and civilian agencies, as well as the defense department – is truly protected.  President Obama issued  an Executive Order in February on improving critical infrastructure security and NIST (National Institute of Standards and Technology) initiated several workshops on how to address cyber threats with a cybersecurity framework. While these are steps in the right […]

Categories : APT, Data Security            Leave a comment           

Advanced Persistent Threats (APTs) hardly need an introduction these days. First widely recognized as a threat vector of rising severity following the discovery of the Stuxnet worm in 2010, and gaining greater distinction as a result of the Mandiant report into APT1 in February this year, APTs have firmly entered the security vernacular and have become a serious concern for enterprises – and rightly so. Being so targeted and often going undetected for long periods of time, this type of […]

Categories : APT, Big Data, Data Breach            Leave a comment           

Reflecting on our celebration of independence earlier this month gives us a chance to think about what is important to us as Americans – and the associated rights, privileges and responsibilities. Regardless of our beliefs, we can all agree that certain things are personal, sensitive and private. This may include ideas, concepts and inventions. It should also include the data that sits behind them. Why? Because this data fuels our businesses, our personal lives and our governments. This data has […]