Defensive Security Podcast Episode 230

https://arstechnica.com/information-technology/2018/11/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin/
https://krebsonsecurity.com/2018/11/marriott-data-on-500-million-guests-stolen-in-4-year-breach/
https://krebsonsecurity.com/2018…

Oracle EBS Security auditing

So this is my attempt to improve on this post I wrote last year and other tests that I find helpful. Whatever is outlined here really is a tip of the iceberg and further tests should definitely be done depending on scope, objectives… Application …

Improve Security by Thinking Beyond the Security Realm

It used to be that dairy farmers relied on whatever was growing in the area to feed their cattle. They filled the trough with vegetation grown right on the farm. They probably relied heavily on whatever grasses grew naturally and perhaps added some hig…

Do You Suffer From Breach Optimism Bias?

Optimism bias is the belief that each of us is more likely to experience good outcomes and less likely to experience bad outcomes. How prevalent is this in the cybersecurity industry? If you’re a salty security professional like me, you already know the answer.

Convergence is the Key to Future-Proofing Security

I published a new article today on the Oracle Security blog that looks at the benefits of convergence in the security space as the IT landscape grows more disparate and distributed.

Security professionals have too many overlapping products under manag…

5 Advantages of Using Video Surveillance in Your Business

Do you currently use video surveillance cameras to help protect your business? If not, you may be putting yourself and your livelihood at risk. The fact is, the vast majority of business owners have begun to use video surveillance to help safeguard the…

Tips for Protecting Your Pool and Minimizing Accidents this Summer

It doesn’t matter what type of pool you have – above or below ground – safety is a top concern. You need to make sure you take the proper security measures to ensure accidents don’t occur. Are you wondering how you can effectively protect your pool, fr…

New Business Owners: What to Include on Your Security Checklist

As a business owner, there’s an unfortunate truth you have to face – crime is a reality. This means you have to remain on guard and vigilant about security for your commercial property, your employees and your office. If you have recently become a busi…

Defensive Security Podcast Episode 223

https://www.straitstimes.com/singapore/personal-info-of-15m-singhealth-patients-including-pm-lee-stolen-in-singapores-most
https://www.bankinfosecurity.com/labcorp-still-recovering-from-ransomware-attack-a-11235
https://www.securityweek.com/cyber-axis-…

Insurance Occurrence Assurance?

The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection for the operational state of your organization than cyber security insurance alone. To put it another way, insurance is a reactive measure whereas an effective security program is a proactive measure.