–Cybersecurity

12月 182017
 

You never saw it coming. No indicators of attack on your financial data. Then, you get a letter. Your financial information was exposed in a massive data breach. What do you do now? Your identity is forever at risk. Unfortunately, you can't change where you used to live, when you last [...]

Why now is the time to identify indicators of attack was published on SAS Voices by Liz Goldberg

4月 032017
 

Operators of transmission networks and wholesale electric markets – ISOs (Independent System Operator) and RTOs (Regional Transmission Organizations) – have undergone sweeping changes in recent years, and the pace won’t be letting up anytime soon. With opportunities ranging from the growth of renewables to newly data-rich operating environments, and challenges [...]

Promise and uncertainty in the ISO marketplace: Four things you should know was published on SAS Voices by Mike F. Smith

4月 012017
 

Security analytics has gotten a lot of attention in the industry the last few years. That’s not surprising. After all, security analytics can help organizations: Transition from reactive threat firefighting to proactive security risk management. Exploit all available security data to develop better insights and priorities. Maximize the effectiveness of [...]

Security analytics skeptics have nothing to fear was published on SAS Voices by Liz Goldberg

3月 042017
 

The Obama administration made great strides in improving the government’s use of information technology over the past eight years, and now it's up to the Trump administration to expand upon it. Let’s look at five possible Trump administration initiatives that can take government’s use of information technology to the next [...]

5 Tech initiatives for the Trump administration was published on SAS Voices by Steve Bennett

2月 112017
 

People come from all over the world to attend this highlight of the season. It’s been a tradition for decades. Hotels book months in advance. Traffic is horrendous in the city center. The coveted tickets can cost thousands of dollars, but tens of thousands of people are lucky enough to score them. In […]

It's February. Game On! was published on SAS Voices.

2月 112017
 

People come from all over the world to attend this highlight of the season. It’s been a tradition for decades. Hotels book months in advance. Traffic is horrendous in the city center. The coveted tickets can cost thousands of dollars, but tens of thousands of people are lucky enough to score them. In […]

It's February. Game On! was published on SAS Voices.

12月 062016
 

The cybersecurity challenge exemplifies how global threats have evolved and how governments must combat them. For all the complexity of the Cold War, the United States defense officials knew the nations that posed the biggest threat. The world is much different today. As General Michael Hayden (ret.), former Director of the National Security […]

Cybersecurity: A conflict of old and new was published on SAS Voices.

8月 032016
 

Some weeks have passed since the United Kingdom voted, by a margin of 52 per cent for and 48 per cent against, to leave the European Union, the organization it's been a leading member of since 1973. The tumultuous global reaction to the vote has those of us in information […]

How will Brexit impact cybersecurity? was published on SAS Voices.

2月 222016
 

There's a lot of chatter about analytics in the information security space. That’s actually a massive understatement. Analytics is a common buzzword, and if everyone's talking it, but how do you cut through all the noise? Who is doing what when it comes to analytics? It can be difficult to tell. As part of […]

Finding a signal in the cybersecurity noise was published on SAS Voices.

2月 162016
 

What do you get when you add together: Two basketballs; six people wearing black or white t-shirts; and a chest-beating gorilla? Oddly enough, a great analogy for the challenges information security professionals constantly face (more on that in a minute ...). We'll be talking about security challenges of all kinds […]

Cybersecurity and the invisible gorilla was published on SAS Voices.