From the Fall 2016 Issue

LINGERING VULNERABILITIES

Author(s):

Ragu Ragunathan, Principal Cybersecurity Consultant, Web Traits, Inc.

Most organizations depend on a complex set of information systems for their mission-critical functions. The risks to these systems and the information they contain are one of many concerns for management at all levels. For … Read more

From the Fall 2016 Issue

The Cybersecurity Poverty Line

Author(s):

Mike Dombo, Vice President, Sales, Point3 Security, Inc.

In her 2013 RSA presentation, “Living Below the Security Poverty Line: Coping Mechanisms,” Wendy Nather coined the term “Security Poverty Line” to better elaborate on the dismal state of security in organizations’ application development shops.1 … Read more