Last week, I had the privilege of attending ConnectWise’s IT Nation Secure conference. The three-day conference focused on managed service providers (MSPs) – specifically, how those MSPs can better secure and protect small businesses and midmarket companies. If you haven’t attended this conference in the past but have attended others, I highly recommend attending the ConnectWise IT Nation Secure conference due to the unique perspective they provide for the cybersecurity industry.
Ken Buckler
Recent Posts
IT Nation Secure Conference Highlights Solutions to the People Problem in Cybersecurity
By Ken Buckler on Jun 13, 2023 6:39:53 AM
RSA Conference 2023: A “Stronger Together” Moment for Cybersecurity
By Ken Buckler on May 8, 2023 1:15:00 AM
The 2023 RSA Conference was one of the largest and most impactful cybersecurity events of the year. The conference brought together a large number of exhibitors, training sessions, and sponsor briefings and generated a lot of buzz on social media platforms, such as Twitter and LinkedIn. We took some time to analyze the data from social media and the conference and found some interesting trends.
A Valentine's Day Wakeup Call: The Heartbleed Vulnerability and the Urgent Need for Improved Cybersecurity
By Ken Buckler on Feb 14, 2023 6:05:20 AM
As of January 2023, Over 194,000 Systems on Internet Still Vulnerable to Heartbleed
The Bleeding Heart of the Internet
In April 2014, the Heartbleed vulnerability was publicly disclosed, sending the information technology world into a panic and rushing to patch this critical vulnerability in OpenSSL, which was allowing the theft of information directly from the memory of vulnerable systems, including private keys and other secrets. This vulnerability featured extremely easy exploitation by attackers, leaving no trace of attacks. Heartbleed ultimately resulted in many late nights for most of the information technology industry, who worked to implement and validate patches for open and closed source products that have integrated the OpenSSL libraries – which accounts for an extremely large percentage of technologies connected to the internet.
RSAC 2022 Closing Thoughts - Return of Cybersecurity Conferences to the Wild, Wild West Coast
By Ken Buckler on Jun 16, 2022 9:43:34 AM
It’s time to circle the wagons and defend the data and users
As the world reopens, the conference booths light with excitement and empty expo halls are once again filled with hustle and bustle. I thought it important to take a moment and look at what changed in the past two years and where the security industry has room for improvement. This was the first in-person RSA Conference, and likely the first major security conference at all for that matter, with large in-person attendance after the peak of the COVID-19 pandemic. While the conference looks very similar to conferences before the pandemic, the cybersecurity industry landscape has drastically changed.
Intelligent Mice, Intelligent Mouse Traps – The Future of Cybersecurity and AI
By Ken Buckler on May 31, 2022 6:27:37 AM
Long gone are the days of simple, signature-based defenses against cyber-threats.
Cyber-threats are growing at an exponential rate in the perpetual cat-and-mouse game of cybersecurity, and traditional approaches to cybersecurity are struggling to keep pace. In 2021, anti-malware vendors estimated that they detected between 300,000 and 500,000 new pieces of malware every day. That means than in 2021 alone, over 100 million new pieces of malware were created. Even if cybersecurity vendors can keep up with the sheer volume of new pieces of malware, traditional signature-based and even heuristic-based detection algorithms will struggle to keep up – and that’s only for known malware.
Not so Quiet on the Cyber Front: Why Your Organization is Still a Target
By Ken Buckler on Mar 4, 2022 2:27:34 PM
It's been quite an interesting couple of weeks. What started off with rising tensions as Russia amassed troops at the Ukraine border evolved into a full invasion of the country. Our newsfeeds are filled with stories and images of ace fighter pilots, brave soldiers making their final stands, and farmers stealing Russian tanks by hooking them up to farm equipment – but another battle has been taking place behind the scenes for many years.