Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Web sites and youtube videos
Examples of Video recordings
Cybersecurity, cybertechnology, & international security.
Researcher Graham Fairclough discusses cyber security and its interplay with state and non-state actors. He reviews the history of cyber attacks and attempts to describe what cyber warfare may look like in the future.
Apple takes down developer site after hacking
Apple's developer site is unavailable for software engineers after a hacker tried to steal personal information, the company said. Immunity CEO Dave Aitel speaks with Cory Johnson on Bloomberg Television's 'Bloomberg West.', In this video published in 2013
How to Measure Anything in Cybersecurity Risk by
Publication Date: 2016-08-17
A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security. Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
What Would a Breach Cost Us?
The impact, or consequences, of a cyber event can be substantial and complex. Costs can accrue as a result of disruptive effects on personnel, technical architecture, technology operations, business processes, customer impact, and regulatory exposure as well as a myriad of factors associated with the return to business as usual. Responses described in reporting on recent high-profile breaches have provided glimpses of varying organizational approaches to measuring actual impact. This has revealed high costs that stretch into areas well beyond the affected enterprise’s preliminary consideration