Search This Blog

Showing posts with label cybersecurity. Show all posts
Showing posts with label cybersecurity. Show all posts

Friday, May 3, 2019

How to win customers in cybersecurity marketing

Those who work in the cybersecurity business know that they have to keep up to date on points of vulnerability in technology to maintain their edge. What the ones who successfully market their products also know is that they have to adapt to evolving customer expectations in the highly competitive B2B market.
What goes into successful cybersecurity marketing? The answer to that was offered by Ken Rutsky, author of Launching to Leading: How B2B Market Leaders Create Flashmobs, Marshal Parades, and Ignite Movements in a recent interview about the paradigm shift that has occurred in B2B messaging and positioning.....
It’s all about “how to make value conversations relate to the buyer -- not the seller,” he says. 

Monday, January 4, 2016

Security through sharing

On December 18, 2015, President Obama signed off on the 2,000 plus page omnibus budget bill, that amounted to spending $1.8 trillion in a combination of government allocation and tax breaks. Among the items packed into this gargantuan package is the Cybersecurity Act of 2015, also known as the Cybersecurity Information Sharing Act (CISA). Set to stay in effect until September 30, 2025, it's a bill that will keep on giving for a decade. But not all regard it as a gift.

The bill had some vociferous opposition, most notably from the group called Fight for the Future. As late as December 16, the organization appealed for a veto on the law. Its campaign director, Evan Greer, declared that the bill is "a disingenuous attempt to quietly expand the U.S. government's surveillance programs, and it will inevitably lead to law enforcement agencies using the data they collect from companies through this program to investigate, prosecute, and incarcerate more people, deepening injustices in our society while failing to improve security."

The part that critics of the bill are most uncomfortable with is the permission granted to monitor networks. That makes up the first of three components of the bill's effects that comes under the heading "Authorizations for Preventing, Detecting, Analyzing, and Mitigating Cybersecurity Threats," presented in the analysis of the bill by Orin Kerr, Research Professor at The George Washington University Law School. He sums it up as: "First, network operators can monitor; second, they can operate defensive measures; and third, they can share information with others."

The third part of the mitigation formula is the equation of forewarned is forearmed. The idea is that putting out updates about the latest cyber threats in real (or very near real) time would give a heads up to other organizations that can take preventative action to avert attacks. The same assumption underlies IBM X-Force Exchange (XFE), a cloud-based platform for accessing information about cyber threats.

Read more in: 
Not everyone believes the new cyver security law passed on December 18 as part of the omnibus bill will prove effective. What do you think?