From the Summer 2015 Issue

The Next Big Data Breach: Don’t Let It Be You!

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Protection of information and data has always been one of the top priorities for organizations, governments, and businesses. For example, small restaurants have their “secret recipes” that set them apart from their competition. Larger organizations like Coca-Cola guard their product formulae and protect them like the Crown Jewels of England. On the government side, the … Read more

From the Summer 2015 Issue

Exploring Behavioral and Neuroscience Approaches to Cybersecurity: A Study of Phishing

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The behavioral factors that contribute to users falling victim to phishing attacks include a lack of understanding of how computer systems work, lack of attention, and phishers’ increasingly sophisticated methods of visual deception.  Attacks on our computer systems continue to increase in frequency and sophistication. Organizations invest significant resources in the development of cyber protection … Read more