Security

WATCH: Always On Virtual Series Spotlight: Securing an Insecure World

Not a day goes by without a phishing incident, a ransomware attack taking down a major corporate network, or a data breach compromising millions of customer records. And these are only the ones that are detected and reported by the media. We live in an “Assumption of Breach” world and as attack surfaces exponentially increase […]

05.08.2019

Security

Choosing a Security Solution: Take the Long View

Once you’ve assessed your needs, look past the glossy sales material and slick user interfaces to understand how well the security solutions you’re being pitched will work in the long term. Focus on gritty practical issues such as: Total cost of ownership: Given the size and skills of your staff, will you need to hire […]

04.30.2019

Security

To Find the Right Security Tool, Know Thyself

Today’s security threats are more complex than ever – and finding the right tools to combat them can seem overwhelming. In this post, we walk you through the first step towards making the right choice — assessing your own needs. In the following post, we’ll describe how to use this knowledge to compare security products […]

06.28.2018

Rear view of two partially unrecognizable men sitting in front of a computer. One of them is pointing at a screen where are several lines of computer code.

Security

Assumption of Breach, Part I: A New Approach to Cyber Security

Several large enterprises have been victimized by catastrophic cyber security incidents over the past few years. They’re so severe, they even caused executives to resign and profits to disappear. In the wake of these high-profile incidents, the media’s message has been clear: if organizations with nearly unlimited resources can be compromised, data breaches are inevitable […]

12.12.2017

Security

WannaCry Ransomware Q&A

Late last week, businesses and organizations around the world in more than 150 countries were hit with a strain of ransomware known as Wanna Decryptor, WannaCrypt, WanaCrypt0r and WannaCry—and the ransomware shows no signs of stopping. According to a CNN article, the attack was so extreme that it “caused Britain’s NHS to cancel surgeries, a […]

05.15.2017

Mid section view of a businessman hand touching secure server words represent the concept of secure data storage. Protect your knowledge and business data.

Security

Ransomware and Things That Go Bump in the Night

In the treacherous world of cyber security—or cyber insecurity—things that go bump in the night are the things that can bring an organization to its knees. Unexpected new breach threats, employee errors, and poor data policies can destroy even the most iron-clad cyber security strategy. Here, we break down three things that keep security professionals […]

03.14.2017

Data Protection

Security

Assumption of Breach Part IV – Technology

We have reached the end of the line! After discussing the importance of a robust defined security policy in my last blog entry, in this post I’ll be tackling the fourth and final foundational element in an effective security program—technology. Security technology can be broken down a number of different ways, but at Carousel, we […]

02.04.2017

Business People Planning Strategy Analysis Office Concept

Security

Assumption of Breach Part III—Policy and Process

In my last blog entry, I discussed the first of three foundational elements for a security program: all of the people who interact with your organization’s systems and data. In this post we’ll tackle the next element of cyber security—policy and process. For the purposes of this post, I am going to use these two […]

01.30.2017

Security concept with businessman and hacker hands on laptop keyboard.

Security

Assumption of Breach, Part II—The People Element

In the first installment of this series I discussed the need for organizations to change their approach to cyber security to an “assumption of breach model,” or an understanding that in today’s threat landscape, it is unrealistic to thwart 100 percent of malicious attacks. That previous post also mentioned that this new approach should focus […]

01.16.2017