The problem that must be solved

Despite leaps and bounds in cybersecurity technologies and capabilities, the number and severity of breaches have continued apace as if nothing has changed. As might be expected, adequate insurance is costly and difficult to obtain in this adversarial environment[i]. Around two-thirds of members of boards of directors lack confidence in

Read More

Introduction to Risk

  The standard risk calculation, shown above, shows all three components that need to be considered.  Risk is the combination of the hazard, the exposure, and the consequence. The likelihood of hazard of a particular magnitude with the likelihood that we are exposed to that specific vulnerability and the probable consequences

Read More

Existing Cybersecurity Defenses Are Failing

According to Verizon in its 2014 Data Breach Investigations Report, the number of disclosed cybersecurity breaches per year has gone from fewer than 50 ten years ago to nearly 1,400 today. These events are not limited in any way by industry, company size, business type, or target. Shockingly, this almost

Read More

SIKERNES Automated Threat Analysis

Making threat analysis actionable & affordable for everyone Paul is the lead system administrator at a mid-sized, regional bank with assets valued at about $5 billion. After learning about the JP Morgan-Chase breach, the risk officer initiated a review of the bank’s security posture. Paul has since been tasked with

Read More