Locking down your network? Technopedia collaborates with industry cyber security experts, including Armor CSO Jeff Schilling, on best practices for keeping your infrastructure safe from attacks and other malicious behavior.
ThirdCertainty | November 20, 2015
It’s no shock that 2015 represented one of the most shocking years for high-profile data breaches. And many cyber security experts are expecting more of the same for 2016. ThirdCertainty, an independent news organization that focuses on privacy and security risks, asked the world’s top cyber security experts on what to expect during the next 12 months.
Armor CSO Jeff Schilling believes that threat actors will focus more and more on big data aggregation, but then move on to a new attack vector: physical penetration.
It’s conventional wisdom among cybersecurity experts that both the U.S. government and many industries have underinvested in cyber security, even as the number and scale of threats have visibly grown. But now that appears to be changing, as many institutions are now ramping up hiring, and the next generation of cybersoldiers is stepping up. Armor CSO Jeff Schilling has cautioned for years that the world was grossly short of properly trained cyber security professionals.
Each winter, shoppers flock to online stores to fill holiday wish lists and avoid crowded stores. While holiday tips seem like a cliche topic, threat actors are always evolving their tactics to increase their chances for success. To keep abreast of the latest threats, USA Today polled security vendors for nine tips for staying safe this shopping season. Armor CSO Jeff Schilling advised consumers to be very cautious of locking their mobile devices.
TechTarget | SearchSecurity | November 18, 2015
What requires the most time for cyber security managers? According to a TechTarget study, it’s IT risk management and regulatory compliance. Armor CSO Jeff Schilling explains that understanding time and resource limitations is a common risk management challenge he sees in organizations.
How B2B Companies Outsource Managed Security Services
B2B News Network | November 17, 2015
Today’s CISO faces new challenges for managing security services. From new threats, complex compliance requirements, investor pressure and market competition, CISOs are tasked with an almost impossible balancing act. As such, many are outsourcing security services to expert vendors. Armor CISO Kurt Hagerman offers guidance to the B2B News Network on why it’s critical for organizations to match the right technology, personnel, process and third-party vendors.
TechTarget | SearchSecurity | November 12, 2015
The Tor Project claimed it learned more about an attack on its Deep Web hidden service subsystem that was detected in July 2014. The Tor Project said that the Carnegie Mellon researchers responsible for the attempt to hack Tor’s network were hired by the FBI. Dr. Chase Cunningham, Armor’s head of threat research and development, weighed in on the Tor Project’s claims. Was it just so Carnegie Mellon researchers could say they did it?
Hacked Opinions: Veterans who Transitioned into InfoSec
CSO | November 11, 2015
In a special Veterans Day feature, CSO writer Steve Ragan profiles six veterans who have transitioned into successful careers in information security. Core to his story, Armor CSO Jeff Schilling — a retired U.S. Army Colonel — discusses his transition into cyber security, adjustments between active duty and civilian roles, and advice he’d give other veterans seeking similar career paths.
The High Cost of Staying Protected: Security Expenses
SC Magazine | November 04, 2015
Lack of commitment to cyber security budgets is a key reason many organizations are failing to keep pace with what’s required to properly defend data in today’s threat landscape. Armor CSO Jeff Schilling further explains that the healthcare industry is one of the least prepared to defend ePHI and other sensitive data. To date, their focus has been on patient care — and that should be their core focus. But this introduces the challenge of healthcare organizations attempting to protect some of the most critical data with extremely limited budgets.
Tips for Improving Enterprise, Personal Security Online
eWeek | October 29, 2015
Armor’s head of threat research and development, Dr. Chase Cunningham offers critical advice to eWeek as part of 12 tips to help users avoid becoming an easy target. Cunningham explains why it’s always smart to validate that a URL matches the site users want to visit. He later asks users to be wary of unusual or unexpected communication from friends, co-workers or neighbors. They may be unknowingly distributing malware.