NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.
Related: ‘Business logic’ hacks on the rise
Consider that we began this century relying on the legacy “waterfall” software… Continue reading NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.
Related: Will ‘blockchain’ lead to more equitable wealth distribution?
We … Continue reading MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Cloud migration, obviously, is here to stay.
Related: Threat actors add ‘human touch’ to hacks
To be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. But there’s no doubt that the exodus to a much g… Continue reading Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.
Related: Mock attacks help schools defend themselves
Now COVID-19 has dramatically and permanently expanded that parental responsibility, as we… Continue reading MY TAKE: Remote classes, mobile computing heighten need for a security culture in K-12 schools

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

Ransomware is undoubtedly one of the most unnerving phenomena in the cyber threat landscape. Numerous strains of this destructive code have been the front-page news in global computer security chronicles for almost a decade now, with jaw-dropping ups a… Continue reading SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Enterprise risk management (ERM) is a comparatively new corporate discipline. The basic notion is that in today’s complex operating environment, it is important for businesses to proactively identify operational hazards and have a plan in place t… Continue reading Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

MY TAKE: Technologists, privacy advocates point to flaws in the Apple-Google COVID-19 tracing app

If the devastating health and economic ramifications weren’t enough, individual privacy is also in the throes of being profoundly and permanently disrupted by the coronavirus pandemic. The tech giants are partnering on a tool for public good, but… Continue reading MY TAKE: Technologists, privacy advocates point to flaws in the Apple-Google COVID-19 tracing app

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.
Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are c… Continue reading NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve… Continue reading GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.
Related: Why U.S. cybersecurity policy needs to match societal values
CISOs must preserve and protect t… Continue reading MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks