Use Offensive Engagements to Improve Your InfoSec Program in 2020
Warfighters have used offensive engagements to improve their planning and execution for centuries. Military planners “red team” battle plans with dedicated teams designed to emulate the adversary’s capabilities and behaviors.
Read the Article
Stay up-to-date on the latest in Cybersecurity & Analytics
When you sign up for the Columbus Collaboratory Newsletter, we'll regularly send the latest industry news, need-to-know information, and expert insights straight to your inbox.
Sign Me Up
Our Vulnerability Management Solution Now Offers More Ways to Continuously Assess Risk
A recent press release highlights the advancements that can eliminate security blind spots without major customization.Enterprise IT leaders must continuously monitor threats and review
Columbus Collaboratory’s SOC 2® Type 2 Examination Confirms Its Commitment to Transparency
Independent auditing firm GBQ Partners completed the report, which verified Columbus Collaboratory’s controls for ensuring accessibility while protecting and securing data.
2020: The Year to Get Serious About Analytics and Cybersecurity
Analytics and threat intelligence are two sides of the same coin when it comes to preparing your enterprise for the future. That’s why we encourage our clients to take part in annual workshops and programs that help ensure they are proactively addressing both.
Cybersecurity and the Riemann Hypothesis
I was taken with an article I read recently, on a seminal construct in mathematics called the Riemann Hypothesis. The article talked about how researchers at Emory University had made progress toward proving that a central concept – one that has existed in mathematics for 160 years and upon which so many other mathematical principles are based – is in fact true.
4 Key Takeaways from Verizon’s 2019 Data Breach Investigations Report
If there’s one thing that the very opinionated and often fractious IT and cybersecurity field can agree on, it’s this: Verizon’s annual Data Breach Investigations Report (DBIR) is the one security report you should read every year. Not skim; read.
Me and My Shadow Hit InfoSec 2019: Here’s What We Heard
I recently attended the 12th annual Central Ohio InfoSec Summit—my fourth InfoSec event since returning home to Ohio from DC and shifting from the public sector to commercial sector practice. It was a unique event for me as a speaker and mentor representing the Columbus Collaboratory.
How to Stop Fighting Ghosts and Get Real About Cybersecurity
All too often, security leaders find themselves investing in cybersecurity tools aimed at stopping invisible enemies—adversaries with the inhuman capability to attack from all directions with what appear to be unpredictable tactics.
On Offense Informed Defense
Ask any experienced offensive tester about the latest whiz-bang infosec tool, and you’ll get a predictably skeptical response. Sometimes skeptical would be putting it mildly. You’ll hear impassioned arguments like “You shouldn’t worry about Advanced Super Fuzzy Panda APT # 4,172 hand-writing zero days when you have SMB and RDP exposed to the Internet!”
Fighting Cybercrime with Collaboration
Concerns about remaining competitive often limit organizations from innovating and learning together; however, for cybersecurity, those boundaries must be minimized or eliminated. By capitalizing on the collective know-how possessed by its member organizations and partners, Columbus Collaboratory creates cybersecurity products and services while also supporting tech talent in the Columbus Region.
Information Security: What to Expect in 2019
The start of a new year is always a good time to assess what your team achieved over the past twelve months and prioritize those activities that you believe will make a difference to your company this year. In order to assess your IT security team’s goals and objectives, it helps to review what the experts believe will happen in the broader security market; what your leadership team has set for objectives for the organization; and how your team will do their jobs.
What Ohio’s Legal Safe Harbor Laws Means for You
In my years at IBM and now at Columbus Collaboratory, I have been asked to build internal programs, software products, marketing organizations and many other forms of business capabilities.
My Experience at useR! 2018 Conference
Two tutorials, 6 amazing keynotes, one trip to Australia, and tons of incredible talks, posters, and conversations later my second useR conference is a wrap. #useR2018 did not disappoint.
Ohio is Gaining a Reputation as a High-Tech Hub
In a recent interview with Ted Griffith, managing director of information technology at JobsOhio, Adam Burroughs of SmartBusiness discussed the growth of technology companies in Ohio.
Is Your Organization Vulnerable to Password Spraying?
Attackers abuse poor passwords. In any given environment with more than a few hundred end users, it is almost guaranteed that someone has chosen a poor password.
Struggling to Keep Up with an Evolving Cyber Threat Landscape? You’re Not Alone
According to our 2017 Forrester survey, firms are struggling to keep up with an ever-evolving threat landscape. Here’s how to stay ahead of the wave.
Need Guidance on New Technology? Get By With a Little Help From Your Peers
According to our 2017 Forrester survey, more firms are looking to industry peers for new technology guidance. Here’s why.
To Speed New Technology Adoption, First Address These Security Concerns
According to our 2017 Forrester survey, Security concerns can impede adoption of new technology. Here’s how to fix it.
Enterprise Leaders: Building a Roadmap to Innovation
According to our 2017 Forrester survey, enterprise leaders are supportive of innovation—they just need a roadmap.
Confidence: Why It’s Missing From Most New Tech Adoption (And How To Gain It)
A 2017 Forrester survey reveals a widening gap between the current knowledge base of enterprise teams and emerging and advanced threats in new technologies.
See if you're a good fit for Collaborative Security. Contact us today for a free evaluation.
Start the Conversation
Download our fact sheet to learn how our solution can eliminate security blind spots and help you make more informed decisions about business risks.
Download Our Fact Sheet