Is Identity the New Perimeter in Security?

I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you name it. If I didn’t have experience in identity management and understand the importance it has in an environment, I may have just blown off that [...]

STOP the Madness…..

FocusPoint is introducing a new program called STOP – Security Technology Optimization Program. This offering will focus on helping companies get the most out of their security technology investments, without adding more tools to the mix. We think the acronym STOP is perfect – not only does it name the program, but it also [...]

SECURE is a dangerous word in security.

SECURE is a dangerous word in security. As of July 2018, Google instituted a “non-secure” for HTTP websites and “secure” designation for websites that utilize HTTPS. Google has been warning website owners for years that they are moving to this identification of websites that don’t utilize HTTPS. They also stated that that your website [...]

“Alexa . . . how do I secure the Internet of Things (IoT)?”

Imagine, a device in your home, with access to multiple parts of your home (TV, lights, thermostat, door locks). The device is always listening for your command, which means it’s also always listening to your conversations. The device is certainly connected to a network, which probably isn’t set to be very secure by nature. [...]

Are Your Executives Engaged in CyberSecurity?

Many executive leaders are criticized for not caring about or understanding cybersecurity. This comes from the perception that they do not realize the true threat landscape, they are not allocating resources, and/or they are not talking about the topic on a regular basis. For many organizations, there are good reasons for this perceived behavior. [...]

Latest Developments in the CIS Top 20

Just when you feel you understand the CIS controls, a new version is released. In this case, the new version of CIS controls hopes to improve by separating them into three distinct categories and giving a more concise description for each. This should be good news! That said, those that have tried to implement [...]

Security Orchestration and Automation

When it comes to a successful security program, efficiency and incident response time are two key factors. Today's security teams are often understaffed and overworked. Tasked with using numerous disparate tools, many employees are struggling to prioritize incidents and determine what is important. Orchestration and automation tools streamline these processes, bringing together all your [...]

So Many Emails, So Little Time!

In-person technology collaboration is becoming a low priority. As a leader in technology, I very rarely respond to the plethora of emails, calls, mail that I receive from external sources. Especially in the cyber security space, I received upwards of 300 different interactions EVERYDAY. Anywhere from webinars, articles, sales material, even from reputable sources [...]

State Of Crime In Cyber From IOCTA 2017

Recently a white paper came out discussing the state of crime in cyber from IOCTA 2017.   It was released from Europol so it focuses on Europe.    Since we love to devour this type of data at FocusPoint, we thought we would share our impressions of the report. You can download the report here.   https://www.europol.europa.eu/sites/default/files/documents/iocta2017.pdf [...]

Best Of Breed Is Not Always The Best Way To Go

In the technology industry it seems that everyone likes to state that they represent "Best of Breed" technology.    Utilizing the best of breed point solutions if you have unlimited budget, people and time is probably the best way to go.   However, in most organizations there are constraints on money, people and time. [...]

Hey before you leave. Subscribe to The Cyber Chronicle – Most popular news each week on cyber security.

Opt out at anytime.   No SPAM just great weekly content.

Click here to receive information about our free cyber security assessment.