Filter By:

Recent Blogs & Podcasts

86 Results for: "Ken Van Wyk"

 



October 22, 2017 | Data Breaches
By Ken Van Wyk, IANS Faculty

 Van Wyk: Take Steps to Protect Yourself as a Consumer

With all the digital threats we face on a daily basis, it's a miracle we haven't all been hacked. To ensure the odds are in your favor, there are some informed and well-planned steps you can take to protect yourself as a consumer, particularly as the holiday shopping season approaches. 

Read More »


October 2, 2017 | Incident Response Planning
By Ken Van Wyk, IANS Faculty

 Van Wyk: Doing Your IR Planning the Right Way

In light of the Equifax breach, organizations need to re-examine their incident response planning to ensure similar crises are handled effectively. Being proactive, communicating transparently and prioritizing customers are three important pieces of the IR puzzle,.

Read More »


July 21, 2017 | Mobile Access and Device Management
By Ken Van Wyk, IANS Faculty

 Van Wyk: Security Track Record for iPhone Not an Accident

It’s not just luck. Apple has managed to keep the iPhone (and its iOS brethren) safe from any major malware outbreak for 10 years. Building a multi-faceted security architecture that substantially raises the cost of successful attacks can be extremely effective. 

Read More »


June 12, 2017 | Malware and Advanced Threats
By Ken Van Wyk, IANS Faculty

 Van Wyk: Responding to Ransomware

Last month, I wrote that targeted attacks require much deeper analysis than those that are not targeted. While that still rings true, battling non-targeted threats like ransomware is becoming an increasing problem for organizations. 

Read More »


May 10, 2017 | Incident Investigations, Handling and Tracking
By Ken Van Wyk, IANS Faculty

 Van Wyk: Targeted Attacks Require Much Deeper Analysis

In the world of information security, intentions matter greatly, but they’re only a starting point. Apart from simple intentions, though, is the matter of whether or not an attack is targeted. In fact, when we can establish whether an attack is targeted, we often come to a vital decision point in an incident response operation. A targeted attack can change everything.

Read More »


April 13, 2017 | Data Loss Prevention (DLP)
By Ken Van Wyk, IANS Faculty

 Van Wyk: Get a Handle on Your Data

One person's data is another's active content. The intermingling of data and executable content – or “active content” as it’s often called in web application environments – is a problem we haven't solved yet. We’ve applied a bit of duct tape and bubble gum here and there, but the problem persists.

Read More »


March 14, 2017 | Threat Intelligence and Modeling
By Ken Van Wyk, IANS Faculty

 Van Wyk: Building Your Threat Modeling Process

It’s not often that a new “cool” thing comes along in information security and we’re able to say we’re already doing it. But that’s the case with threat modeling – well, at least in part. You are doing threat modeling, right? If your answer is “no,” perhaps you just know it by a different name. Maybe you call it a design/architecture review, or something completely different.

Read More »


January 18, 2017 | Business Continuity and Disaster Recovery (BCDR)
By Ken Van Wyk, IANS Faculty

 Van Wyk: Action Items For the 2017 Infosec Pro

We’re nearly three full weeks into 2017, and while many infosec pros like to predict the future at this time of year, I prefer to focus on what we’re going to do to shape our futures the way we want them to be. So, while my local gym parking lot is jam-packed during the month of January (I’ll continue to enjoy my two-mile walks right past the gym to the local supermarket), I want to use this as an opportunity instead to come up with an action list for the year ahead.

Read More »