Menu

Stories by Ryan Sherstobitoff

Blog: Anatomy of a Data Breach: A Global Perspective

In the wake of undiscovered data breaches and subsequent public exposure, regulatory compliance and security audit standards are becoming ever more important to protecting critical assets.

Written by Ryan Sherstobitoff30 Sept. 08 14:11

Blog: Why Companies Should Invest in Cloud Computing

Recently I have been getting a number of questions concerning the cost savings of a security-as-a-service (SaaS) model versus a traditional on-premise solution. While there are certainly a number of direct benefits to the end-user (easier to use and upgrades are usually transparent), I thought for the purpose of this article to elaborate on the most important one: “reducing the total cost of ownership (TCO) via the outsourcing of security services”.

Written by Ryan Sherstobitoff23 Sept. 08 14:10

Blog: Security Shouldn't Take a Backseat to Virtualization

There’s no question that advances in server virtualization technology are becoming popular among corporations that want to save money by consolidating resources and improving operational efficiency.

Written by Ryan Sherstobitoff16 Sept. 08 13:46

Blog: Anatomy of a Data Breach

In 2007 and 2008 the industry has seen an upsurge in data breaches affecting millions of consumers and causing corporations to pay heavily in fines.

Written by Ryan Sherstobitoff25 July 08 13:58

Blog: SQL Injections: The Future of Mass Hacking Campaigns

SQL injection attacks are evolving as one of the primary modes of transportation for malicious scripts that hackers insert into legitimate Web sites. According to recent events, this method is becoming very popular amongst the hacker elite, especially taking into consideration the number of sites they are able to exploit almost overnight.

Written by Ryan Sherstobitoff22 July 08 14:08

Blog: Regulatory Compliance & the Real Risk of Undetected Malware

With the emergence of regulatory laws borne out of experience from a variety of embarrassing security breaches, today's corporate leaders face a myriad of repercussions. These range from serious fines to jail time when found not in compliance with regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley (GLB), and Payment Card Industry (PCI), etc.

Written by Ryan Sherstobitoff01 Feb. 08 12:35

Blog: Hype or the Matrix Reloaded: The Government Hacked!

Recently there has been a lot of buzz concerning the latest reports on Government entities being hacked and in some cases their web sites are being defaced. With the increase in sophistication and change in motivation I would not be surprised if some of these attacks were successful.

Written by Ryan Sherstobitoff11 Sept. 07 12:31
Computerworld
ARN
Techworld
CMO