• About 22CW
  • Who is 22CW
22nd Century World

network security

Cyber Hygiene and Government–Industry Cooperation for Better Cybersecurity

July 11, 2017 by 22nd Century World

By The #CyberAvengers Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, and Christophe Veltsos Originally Published on Brink on July 11th, 2017 This past month cybersecurity legislation, called Promoting Good Cyber Hygiene Act of 2017, was introduced that would mandate the National Institute of Standards and Technology (NIST), the Federal Trade Commission (FTC), … [Read more…]

Posted in: Cybersecurity Tagged: awareness, cybersecurity, network security, policy, politics, vulnerability

Ransomware Heists are Only Part of the Board’s Problems

July 11, 2017 by 22nd Century World

By George Platsis & Paul Ferrillo Originally published on Tripwire, July 10th, 2017 It’s 10:00 am Monday morning and management is in the hot seat. The stock has lost 15 points since the opening bell and is going in a downward spiral. The company is being maligned on the news and trolled on social media. Shareholders are … [Read more…]

Posted in: Cybersecurity Tagged: cybersecurity, network security, risk management, strategy, vulnerability

Today’s Cybersecurity Challenges Started in 1648

May 26, 2017 by 22nd Century World

Originally published on Tripwire, May 24, 2017 Understandably, a few eyebrows raise up when I suggest today’s cybersecurity challenges started nearly 370 years ago, some 300 years before the invention of ENIAC (the world’s first digital computer). But I stand by this observation because of the unintended clash of two systems: the nation-state and the Internet. … [Read more…]

Posted in: Cybersecurity, Foreign Relations, Security Tagged: cybersecurity, foreign relations, network security, politics, strategy, vulnerability

When it Comes to Cyber Deterrence, One Size Fits…One

May 23, 2017 by 22nd Century World

Originally Published on SDICyber on May 23rd, 2017 Protecting yourself in cyberspace requires multiple solutions working all together Be cautious of the cybersecurity vendor that promises you a technical solution that will solve all of your cybersecurity problems. Life, unfortunately, is not that simple and a one-size-fits-all approach is bound to get you in trouble … [Read more…]

Posted in: Cybersecurity Tagged: big data, cybersecurity, encryption, information security, network security, risk management, social engineering, tokenization, vulnerability

Fixing the Federal IT Mess Before it is Too Late

May 8, 2017 by 22nd Century World

By The #CyberAvengers Paul Ferrillo, Chuck Brooks, Kenneth Holley, George Platsis, George Thomas, Shawn Tuma, and Christophe Veltsos Originally Published on Levick on May 8th, 2017 Let us take a headcount of recent events: the attack on the Ukraine’s electric grid, a LinkedIn data dump as a result of a 2012 breach, the information warfare … [Read more…]

Posted in: Cybersecurity, Security Tagged: big data, cybersecurity, education, human element, network security, risk management, security, vulnerability

What If “Cyber” Is The Wrong Word?

April 5, 2017 by 22nd Century World

By George Platsis Originally posted on SDICyber.com, March 7, 2017 Often, how you characterize a problem will determine your plan of attack to solve the problem. To illustrate, I often use this example with both clients and friends. If I were to ask you: “How long can you and your business survive without your computer?” … [Read more…]

Posted in: Cybersecurity, Security Tagged: cybersecurity, data security, information security, network security

Categories

August 2022
M T W T F S S
« Aug    
1234567
891011121314
15161718192021
22232425262728
293031  

Recent Posts

  • Multilateral Cyber Interests Will Rarely Align
  • Before You Declare Your Enemy, Be Sure of Your Interests
  • Cybersecurity Starts With Basics
  • Cyber Hygiene and Government–Industry Cooperation for Better Cybersecurity
  • Ransomware Heists are Only Part of the Board’s Problems

Archives

  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • December 2016
  • July 2016
  • June 2016
  • May 2016
  • November 2015

Tags

artificial intelligence awareness big data byod change management communications cybersecurity data security education encryption foreign relations healthcare human element information security innovation legal machine learning mobile computing network security policy politics ransomware risk management security social engineering strategy threats tokenization training vulnerability WannaCry

Copyright © 2022 22nd Century World.

Omega WordPress Theme by ThemeHall