Recent posts by David Venable

David Venable, Vice President of Cyber Security at Masergy Communications, has over 15 years experience in information security, with expertise in cryptography, network and application security, vulnerability assessments, penetration testing, and compliance. David is a former intelligence collector with the National Security Agency, with extensive experience in Computer Network Exploitation, Information Operations, and Digital Network Intelligence. He also served as adjunct faculty at the National Cryptologic School.

Three Steps to Lower Your Cyber Insurance Premium: A Customer Story

After partnering with Masergy, a financial services company was able to downgrade their cyber security risk status from yellow to green. These tactics helped lower their cyber insurance premiums.

Read more

Hacking Run Amok: Recent Major Breaches Call for Extra Diligence

The recent surge of data breaches indicate a new security approach is needed to keep sensitive information safe. Managed Detection and Response can help overwhelmed enterprise IT and security teams fill the gap.

Read more

Managed Security Solutions: Masergy Experts Shed Light on Bitcoin, North Korea, and Cryptocurrency Hacks

Masergy's patented Unified Enterprise Security platform was specifically designed to identify the anomalous lateral movements that undoubtedly took place inside the NiceHash network.

Read more

Is Your Firm Prepared for the New EU Data Protection Rules?

If you do business in the European Union — even if your organization is based elsewhere — get ready. The EU’s upcoming General Data Protection Regulation (GDPR) delivers a long list of what one international law firm calls “onerous obligations.”

Read more

Threat Prevention is No Longer Enough to Protect Your Business

The world of cyber security is an asymmetric battleground. The attack surface is growing as a result of the growing number of connected devices, malicious apps, the Internet of Things, cloud services and the digitization of business functions...

Read more

Threat Intelligence Puts Spotlight on Cyber Exploits

There is a cyber arms race going on and the bad guys appear to have the lead. Cyber criminals recently hacked the U.S. Democratic National Committee, exploiting flaws in both Windows and Adobe Flash. Hackers took down Twitter, Spotify and Reddit in the recent massive distributed denial-of-service (DDOS) attack.

Read more

Cyber Security Moves from Detection to Prediction

In cyber security, many traditional defenses are being outpaced by advanced threats. That's why several cyber-defense organizations are developing non-traditional detection techniques.

Read more

Preventing Lateral Hacker Movement with Crypto-Segmentation

Crypto-segmentation is a new approach to protecting applications and the data they access from hackers who have become adept at penetrating corporate systems.

Read more

4 Critical Steps to an Integrated Security Program

Here are 4 critical steps to align your security strategy with business priorities and get the support you need.

Read more

5 Not-So-Obvious Cyberattack Costs That CEOs Need to Consider

Most CEOs and CISOs already know that cyberattacks can cost their organizations a lot for technical investigation, mediation and cyber security improvements.

Read more

Time to Recharge Your Cyber Security Strategy

Keeping your organization’s IT systems safe and secure has never been more difficult. Companies are under increased threats from a variety of cyber threats.

Read more

Seven Steps to Reduce the Security Risks of BYOD

Enterprise BYOD programs are becoming more sophisticated and mature as employee usage of mobile devices continues to rise exponentially. BYOD security risks are also of growing concern.

Read more

Security Experts Say It’s Never a Good Idea to Succumb to Ransomware

Ransomware has been much in the news due to the dangerous escalation in these types of attacks. Much attention has focused on healthcare attacks but all industries are vulnerable.

Read more

How to Fight the High Cost of Security Salaries

Every CIO knows about the high cost of cyber security. You’ve probably also experienced the skyrocketing salaries that security experts are demanding.

Read more

The Frightening Rise of Cyber Attacks that Cross Organizational Boundaries

If you’re looking for a scary story, put down the H.P. Lovecraft novel and pick up the 11th edition of The Global Risks Report 2016, courtesy of the World Economic Forum.

Read more

European Information Security Directive Looms Large for CISOs

CISOs whose companies do business in Europe will soon have to review and in all probability update their security infrastructure and processes in response to the European Union’s Cyber-Security Directive that was released last month.

Read more

What CISOs Need to Know About New EU Data Privacy Regulations

The European Union (EU) recently passed some of the most aggressive data privacy regulations in existence.

Read more

How Vulnerable is Critical Infrastructure to Cyber Attacks?

Recent cyber breaches of federal agencies and high profile financial companies signal a new wave in cyber warfare and speaks to the need for all organizations to rethink their approaches to security.

Read more

Time to Start Managing Cyber Security Risk

The risk of cyber security threats is growing exponentially and failure to address it in a concerted way can result in serious consequences.

Read more

Much Ado About TrueCrypt

TrueCrypt, the popular cross-platform disc encryption tool, might be secure after all, according to the Open Crypto Audit Project.

Read more

SSL Needs to Go

The PCI Security Standards Council notified security professionals that the SSL protocol no longer meets the definition of "strong cryptography." Here’s why and some suggested next steps

Read more