Cyber Risk Blog | Nehemiah Security™

A Cyber Mom’s top 3 back-to-school reminders for cyber safety

Hear that? It’s the collective sigh of relief from parents who have survived another summer of camps, swim meets, juggling child care, screen time management, and “I’m bored.” Congratulations, parents! We made it through another one. Time to put our feet up and relax with that lukewarm cup of coffee sitting on your counter, right? Who am I kidding?! Back to school do [...]

Keep Reading

Data Breach Report: August 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in August 2018. Doesn't this really put things into perspective?   Nearly 15 Million Consumers Exposed by Breach & Vulnerable Website - August 1st Southern Baptist mission board reports data breach - August 1st Technion team breaches Intel’s new security wall [...]

Keep Reading

It’s Q3: Time to build your cyber budget for 2019!

Fast forward to 2019. Actually, scratch that, 2019 is already here. ESPECIALLY if you are budgeting. In that case, you are already under the 2019 gun. If you are involved in cyber budgeting, one of the challenges you will face is deciding how to prioritize the cybersecurity budget and communicate those priorities to the C-suite. In this blog, we discuss a new way of thinking [...]

Keep Reading

CyberTangent – Bridging the Gap: Women in Cybersecurity with Mary-Sara Camerino

In this CyberTangent episode, we are joined by a very special guest, Mary-Sara Camerino, SVP of Product at Nehemiah Security. Our podcast host is Landon Johnson. Today's topic is Bridging the Gap: Women in Cybersecurity. Let's jump in!

Keep Reading

You must relate requests to concrete cyber risk problems you will solve

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Richard Rushing, CISO at Motorola Mobility, stat [...]

Keep Reading

A Simple Strategy for Managing Cyber Risk – Pulling the Goalie

Do sports metaphors work for cybersecurity practices? Consider whether we can steal a best practice from hockey… As a lifelong and avid Washington Capitals fan, I took great delight watching the final game of the Stanley Cup playoffs. The Caps opponent, the Vegas Golden Knights, were down 3-2 with two minutes left. Desperate to tie the score, the Knights employed a common [...]

Keep Reading

CyberTangent – A Deep Dive into Insider Threats with Grant Elliott

In this CyberTangent episode, we are joined by a very special guest, Grant Elliott, CEO of Ostendio ostendio.com/ At Nehemiah Security, our podcast host is Landon Johnson. Today's topic is A Deep Dive into Insider Threat. Let's jump in!

Keep Reading

Data Breach Report: July 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in July 2018. Doesn't this really put things into perspective? Adidas Breach Hits US Retail Site - July 2 Typeform data breach exposes users of many websites - July 2 Costa Coffee job applicants' details exposed in cyber attack on recruitment website - July 2 Weak Admin [...]

Keep Reading

We Need to Understand Cyber Risk and Make it Tangible

Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice would you give them?” Heath Taylor, Director of Information Security C [...]

Keep Reading

2018 Cyber Risk Analytics Market Survey

As researchers, we devote our waking hours (and sometimes sleeping) to "finding the answer." The irony is, we constantly walk around with a ton of questions! These days at Nehemiah Security, many of our questions surround things like “What are companies doing to measure cyber risk?” This is where you come in. Introducing the 2018 Cyber Risk Analytics Market Survey. We [...]

Keep Reading