Data Breach Report: October 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in October 2018. Doesn't this really put things into perspective? Fin7 Hackers Breached US Chain Burgerville - Oct 5th Magecart Group Targets Shopper Approved in Latest Attack - Oct 9th Pentagon Reveals Cyber Breach of Travel Records - Oct 12th 1 bn records compromised [...]

Keep Reading

Cyber Risk Prioritization Framework: Part One

You may have heard of the book “7 Habits of Highly Effective People.” This 30 year old book written by Steven Covey lays out an approach to being effective in work and in life. For you “Covey nerds,” here is a refresher on the 7 Habits: 1) Be proactive 2) Begin with the end in mind 3) Put first thing first 4) Think win-win 5) Seek first to understand, th [...]

Keep Reading

Data Breach Report: September 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in September 2018. Doesn't this really put things into perspective?   Inside the Magecart Breach of British Airways: How 22 Lines of Code Claimed 380,000 Victims - Sep 6th Foosackly's reports payment-card data breach - Sep 6th Npower ‘urgently investigating’ pe [...]

Keep Reading

CyberTangent – 10 Questions on Cyber Risk with Jerry Caponera

In this CyberTangent episode, we are joined by a very special guest, Jerry Caponera, VP of Cyber Risk Strategy at Nehemiah Security. Our podcast host is Landon Johnson. Today's topic is 10 Questions on Cyber Risk. Let's jump in!

Keep Reading

Cyber Risk: don’t wait to get fit before you work out

An Austrian trainer offered me great advice a while back. A client he was training complained about not being “good” at pull-ups. In his thick Austrian accent (think Arnold Schwarzenegger), his guidance was “get lighter, get stronger.” Makes sense. Later, I heard the same trainer in his same economy of words, describe why so many people hold a gym membership and never u [...]

Keep Reading

A Cyber Mom’s top 3 back-to-school reminders for cyber safety

Hear that? It’s the collective sigh of relief from parents who have survived another summer of camps, swim meets, juggling child care, screen time management, and “I’m bored.” Congratulations, parents! We made it through another one. Time to put our feet up and relax with that lukewarm cup of coffee sitting on your counter, right? Who am I kidding?! Back to school do [...]

Keep Reading

Data Breach Report: August 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in August 2018. Doesn't this really put things into perspective?   Nearly 15 Million Consumers Exposed by Breach & Vulnerable Website - August 1st Southern Baptist mission board reports data breach - August 1st Technion team breaches Intel’s new security wall [...]

Keep Reading

It’s Q3: Time to build your cyber budget for 2019!

Fast forward to 2019. Actually, scratch that, 2019 is already here. ESPECIALLY if you are budgeting. In that case, you are already under the 2019 gun. If you are involved in cyber budgeting, one of the challenges you will face is deciding how to prioritize the cybersecurity budget and communicate those priorities to the C-suite. In this blog, we discuss a new way of thinking [...]

Keep Reading

CyberTangent – Bridging the Gap: Women in Cybersecurity with Mary-Sara Camerino

In this CyberTangent episode, we are joined by a very special guest, Mary-Sara Camerino, SVP of Product at Nehemiah Security. Our podcast host is Landon Johnson. Today's topic is Bridging the Gap: Women in Cybersecurity. Let's jump in!

Keep Reading

You must relate requests to concrete cyber risk problems you will solve

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Richard Rushing, CISO at Motorola Mobility, stat [...]

Keep Reading