Category: Cybersecurity
January 18, 2022
Cloud security forecast: Hazy with a chance of outages
A string of disruptions to Amazon Web Services (AWS) cloud servers in the final months of 2021 affected holiday package deliveries, streaming and gaming apps, personal cash transfer apps, home security cameras and a number of Amazon products, including Alexa and Kindle. These outages further underscore the urgency and importance of cloud security on the … Continued
Uma Palepu
August 12, 2021
PODCAST: Demystifying Cybersecurity — Tips, Trends, and Strategy
Over the last two decades, private equity firms have doubled down on their cybersecurity investments, and it’s easy to see why. Last year broke all prior records related to data loss and cyberattacks. In addition, machine learning (ML) and artificial intelligence (AI) have upped the sophistication of threats. From costly data breaches to paralyzing malicious … Continued
Crosslake Staff
June 16, 2020
Addressing COVID-19 cybersecurity risks
It’s been a few months since the COVID-19 virus has changed the way we live and work. While we seem to be over the peak and things are beginning to re-open slowly but surely, there is no certainty regarding a second wave. We also don’t know what the “new normal” may look like both in … Continued
Rocky Vienna
June 12, 2020
Cybersecurity,Resources,Interim Leadership
3 reasons why your SMB needs a fractional CISO
A witch’s brew of globalization, disruptive technology and regulatory compliance has created new challenges for business executives. Never before has information technology been so integral to a company’s success and outright survival. From emerging to mid-size companies, having a part-time CIO serve on your executive management team is the most effective way to leverage the knowledge … Continued
Rocky Vienna
October 15, 2019
Cybersecurity’s mental illness
Our profession can be a little crazy. We sometimes do things that fit the definition of insanity by dooming ourselves and committing the same mistakes again and again. We make it worse by allowing others (and ourselves) to believe the world is over because a breach occurs while mumbling to ourselves, “breaches will always happen, … Continued
Crosslake Staff
September 23, 2019
Understand your risk — how protected are you?
It is important that security program objectives and controls are supported by the company’s leadership, business units, peer groups, partners and personnel from the top down. Business processes exist to drive revenue-generating activities. Applications are used to reduce the level of effort and mistakes associated with repeatable tasks, and these applications and supporting infrastructure must … Continued
Crosslake Staff