Previously, I reviewed the Davos World Economic Forum Global Risks Report and its coverage of Cyber Security. Shifting gears from canapés to crullers; reviewing Kapersky’s ThreatPost Security Spotlight Report for 2011, we get far more detail, which is to be expected. The Wikileaks event plays a prominent role in this report as well. Basically they confirm my hypothesis that this breach of executive privilege has provided the motivation to address information security concerns. It has also pushed the concept of data security front and center in the business community. Kapersky also posits that Wikileaks and the issues surrounding Cablegate will continue to reverberate throughout 2011. Of particular concern would be the ubiquitous availability of mobile devices and the role they may play in another “Wikileaks” event. [Read more…]
One of the biggest problems we face is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner.
Seth Godin recently blogged about this very problem in a post titled “In and Out”. Basically, you need to determine how much information you are going to take “in” before you actually produce something or “out”.
Well, I’m here to help with some of the clutter; at least on the cyber security front today. A herd of security related reports were released this week and I’m going to provide an overview of each and link them all together over the next several posts. [Read more…]