Blog

peer2peerdiscussion_copy1

Security Awareness Training: We’re Doing it Wrong!

This article originally appeared on RSA Conference blog on March 3, 2015. Join the conversation! It’s a relentless mantra in information security community: “People are the weakest link.” The success of email phishing, watering hole attacks, and over-the-phone social engineering tactics proves that attackers just have to target people in order to sidestep several layers of defense […]

View
EmployeeSpotlight_JasonCecil2

Employee Spotlight: Jason Cecil

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Jason Cecil Title: Software Engineer Time at Rook: 7 months Current City: Indianapolis, IN Hometown: Greenwood, IN Before working at Rook Security, what was the most unusual or interesting job you’ve […]

View
EmployeeSpotlight_DaveDudley_5_G

Employee Spotlight: Dave Dudley

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Dave Dudley Title: Forensic Analyst Time at Rook: Forever Current City: San Jose, CA Hometown: San Jose, CA Before working at Rook Security, what was the most unusual or interesting job […]

View
data breach

Common Data Breach Questions (Part 2)

I am often asked what companies should do when they suffer a data breach. Here are my quick answers to some of the most common questions I get. If you missed Part 1, check it out here to learn what companies should do immediately following a breach, and how they can create a game plan prior […]

View
SIGABA-patent

HIPAA FAQ: Encryption

This series of blog posts features FAQs regarding the HIPAA Security Rule. Is encryption required under the HIPAA Security Rule?   The HIPAA security rule references encryption in the following two implementation specifications of the technical safeguards: Access Control § 164.312(a)(2)(iv) Encryption and Decryption – Implement a mechanism to encrypt and decrypt electronic protected health […]

View
Interior Of Busy Modern Open Plan Office

3 Steps to Identify & Protect Against Insider Threats

High profile security breaches at Target, Sony, and now Anthem, among many others, are driving security spending to the top of IT budgets. In 2015, IT leaders plan to invest more money than ever before in identity and access management, intrusion detection and prevention, and virus and malware protection. However, the threats posed to cyber […]

View
EmployeeSpotlight_JulieBrown-web

Employee Spotlight: Julie Brown

Welcome to our Employee Spotlight blog series, which features Q&A’s from Rook employees as a fun way for you to get to know our team. Name: Julie Brown Title: Director of Marketing Communications Time at Rook: 6 months Current City: Indianapolis, IN Do you have an office nickname? Downtown Julie Brown… to at least the […]

View
data breach

Answers to 3 Common Data Breach Questions

I am often asked what companies should do when they suffer a data breach. Here are my quick answers to the most common questions I hear. Stay tuned for Part 2 coming soon. What should companies do in the first 24-72 hours after discovering a breach? First is triage and fact finding. Identify the list […]

View
Copy of Mira 2015 Logo-V_RGB

Rook Security Nominated for a TechPoint Mira Award

TechPoint, the voice and catalyst of Indiana’s tech ecosystem, announced the nominees for its 2015 Mira Awards yesterday. We are excited to report that we have been chosen as one of 15 nominees in the Emerging Tech Company of the Year category. The winner will be determined at masquerade-themed awards ceremony on May 2, 2015. […]

View
Darron Cummings | AP | A pedestrian walks past the corporate headquarters of health insurer Anthem, in Indianapolis.

Anthem Breach: What Customers Should Know

News broke last night that Anthem Inc., the nation’s second largest health insurer, was hit by hackers. This is a big concern for all customers of Anthem. They’re estimating that roughly 80 million people are affected by this loss of data. Customers’ Social Security Numbers, email addresses, physical addresses, phone numbers, and dates of birth […]

View