Monthly Archives - February 2018

The Three Critical Misses of a Tool-focused Cybersecurity Investment Strategy

As cybersecurity consultants, we see this scenario way too often: Company X has a wakeup call regarding cybersecurity. This often comes in the form of a compromise or breach but sometimes can be more subtle such as discovery of malware in a sensitive environment or a board-level mandate. Immediate action calls are made for 30, 60, or 90 day action plans. Budgets are made available and those in charge go shopping for tools and technology to help solve the problem. Fast [...]