Security standards for the blockchain

In the future, your data may be secured not by some central gatekeeper, but by a vast, distributed set of participants, each holding some or all of it. Blockchain technology is the new frontier of cybersecurity, but it’s also the Wild West of information architecture. What efforts are being made to standardize it? The blockchain […]

Read more
Cybersecurity training is broken

Video: Cybersecurity training is broken. Here’s how to fix it.

User awareness training isn’t working. It hasn’t worked for a while. There are good reasons for this, and as cybersecurity threats mount, it would be good for security pros to understand them. SecTor sat down with several experts at its tenth annual conference in October 2016 and asked them what was wrong. Here’s what they […]

Read more
Single Biggest Cybersecurity Measure

Video: Your Single Biggest Cybersecurity Improvement

There are, at the time of writing, 331 days until the new year. That’s’ a lifetime in cybersecurity. What major goals are you hoping to achieve in your cybersecurity practice before then? SecTor sat down with six experts to get their recommendations for the single priority to focus on in 2017. Here’s what they had […]

Read more
Can we balance security with user convenience

Video: Why users are at war with their systems

Your next major cybersecurity threat may come not from ransomware or an open telnet port, but from a paper cup. In the wrong hands, it can become a deadly weapon. The latest in our SecTor video series shows how. Every day, users are at war with their computers and software. The very systems that are […]

Read more
What Makes a Good CISO

Video: What Makes a Successful CISO?

  What makes a successful Chief Information Security Officer (CISO)? It’s a job title that has only existed for a relatively short time. At SecTor 2015, keynote speaker Trey Ford mentioned that many CISOs were in the job for the first time and feeling their way around the role. A year later at SecTor 2016, […]

Read more
Wassenaar Agreement - should information be weaponry?

What The Wassenaar Arrangement means for cybersecurity pros

Should information be treated like weaponry? The world isn’t sure – and it’s causing cybersecurity companies and researchers real headaches. Hopes for a key resolution on export controls were dashed after annual talks concluded in December – and that leaves some key questions unresolved. The talks were part of the Wassenaar Arrangement, an agreement between […]

Read more
2017 security challenges

Video: What are the biggest security challenges in 2017?

From IoT to dealing with data at scale, the challenges for security pros in 2017 will be as daunting as ever. Last year at the tenth annual SecTor conference, security experts revealed what they thought the biggest challenges of the year might be – and we caught it all on camera. This is the first […]

Read more
2016 predictions review

2016 predictions: how did the fortune tellers do?

It’s the end of the year and the 2017 predictions are flooding in. From the mundane to the mad, companies are falling over themselves to tell us what will happen in the coming year. Here at SecTor, we thought we’d take a different approach and look back to last year’s predictions. What were people saying […]

Read more
Finding the incentive for cybersecurity

Finding incentives for cybersecurity

Another day, another large corporate hack. Companies continue to lose our data, through a combination of poor funding and misjudged security measures. None of them want it to happen, but do they have enough incentives to prevent it? Companies must comply with industry regulations, but as we repeatedly see, the bare minimum often isn’t enough. There’s a difference […]

Read more
Code of Ethics for Cybersecurity

An ethical code for cybersecurity

The battle between black hats and white hats will never end, but do we need some kind of Geneva Convention for how it’s waged? Security pros must often engage black hats, either directly or indirectly, and the rules of engagement aren’t always clear. Sometimes they can also raise ethical issues. Take Facebook’s approach to password […]

Read more
Biometric Doppelganger

How to impersonate someone for 22 cents

  For years, researchers have developed ways to bypass biometric scanners and impersonate other people. Now, there’s a new technique: disguising yourself as Elvis Costello to fool a facial recognition system. Late last month, researchers at Carnegie Mellon unveiled a new attack designed to fool facial recognition systems that involves the use of glasses with […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required