So, You’ve got Cyber Insurance and You’re all Set, Right?  

Cyber Insurance

How about we play a little cyber insurance trivia to find out?  Trust me; it’s more interesting than you might think. In an interview between Carole Theriault and Martin Overton, Theriault plays, “Covered by cyber Insurance, True or False” with Overton, who once worked for a large cyber insurance company. Overton describes himself as a

Navigating an Unchartered Territory of Cybersecurity.

It was by pure chance that I attended a security symposium at Harvard’s School of Engineering and Applied Sciences (SEAS) several years ago. I don’t know exactly what attracted me to this particular meeting of crypto minds, but it was a very fateful day in my knowledge and understanding of Cybersecurity. Among many of the

Dark Web? We don’t need no stinking Dark Web…

Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web.  Ironically, it might really be less accessible – well

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning,

Cybersecurity Starts at the Top

  A majority of an organization’s information is now stored and transferred in digital form creating an extremely urgent need for them to secure their data. The integrity of this digital information is constantly being challenged by attacks aimed at stealing, exposing or manipulating it. This hostile environment affects all industries, from healthcare to finance

Next-Gen Malware Will Own You

Imagine a ransomware that can get past your endpoint protection, disable Windows Defender, shutdown the host firewall, connect to USB drives, disables access to various executables, encrypts your files and plants its own master boot record and its own boot loader. Not cool, right? How about if it were done just for kicks? Some ransomware

The Importance of Analytics to Cybersecurity

In part 5 of 6 Vlogs, CTI’s Director of Cybersecurity, Ben Thurston makes the connection between cybersecurity monitoring and analytics. Ben explains the importance of analytics in gathering data and information from multiple security sources to provide insight into what is going on from a security/risk posture. Security analytics, like the CTI CustomerUniverse, collects information

The Cause of the Equifax Breach: Why Being Right Still Feels Lousy

I recently wrote a blog about my thoughts on the Equifax breach and predicted that, once the cause of the breach was revealed, it would be attributed to human error and could have been completely preventable.  As it turns out, I was right.  While perusing one of my favorites IT websites, The Register, I came

Triangulating and closing security compromises

But the CEO told me to wire $60K to the Caymans! We’ve seen a recent rash of e-mail exploits that blend “social engineering” with e-mail technology. These exploits use e-mail to impersonate respected leaders and authorities of an enterprise giving direction to subordinates or delivering malware payloads and links in what looks like a trusted

How to Value the Cost of a Data Breach

As the Founder and CEO of a technology consulting firm, there are many proprietary data concerns that we must consider and protect, not the least of which is our client information. While our firm, Corporate Technologies, Inc (CTI). may not be directly subject to data security regulations, providing services to many of our clients obligates


© Corporate Technologies, Inc.   |  Privacy & Legal