Richard Stiennon Talks about Security Yearbook 2021 and Getting Through the Pandemic

TechSpective Podcast Episode 059 If you have worked in or near cybersecurity in the last 20 years or so, there’s a good chance you’re familiar with Richard Stiennon. Richard is a former Gartner analyst who has established himself as a leading independe… Continue reading Richard Stiennon Talks about Security Yearbook 2021 and Getting Through the Pandemic

Sam Curry Discusses Privacy, Data Ownership, and Business Continuity

TechSpective Podcast Episode 057 We frequently see data referred to as the “new oil” or the “lifeblood of business.” Hyperbolic catch phrases aside, though, data is everywhere. All of the things are data. As the rate of data creation skyrockets exponen… Continue reading Sam Curry Discusses Privacy, Data Ownership, and Business Continuity

Frank Duff Chats about Latest MITRE ATT&CK Evaluation

TechSpective Podcast Episode 056 MITRE ATT&CK has quickly become an invaluable, third-party assessment that the cybersecurity industry and customers can reference as an objective demonstration of how the tools and platforms perform in real-world co… Continue reading Frank Duff Chats about Latest MITRE ATT&CK Evaluation

Shashi Prakash Chats about Cryptocurrency and NFT Fraud

TechSpective Podcast Episode 055 One of the hot trends right now is the NFT. NFT–pronounced by some as “nifty” because it is catchier than saying N-F-T–stands for “non-fungible token”. NFTs exist in a world that few truly understand (and I don’t claim … Continue reading Shashi Prakash Chats about Cryptocurrency and NFT Fraud

Exploiting Embedded Linux Devices Through the JTAG Interface

With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. While … Continue reading Exploiting Embedded Linux Devices Through the JTAG Interface

Why Healthcare Security Requires an Operation-Centric Approach

The healthcare industry is getting much more attention than normal right now. COVID-19 has disrupted business operations and turned lives upside down around the world as everyone struggles to get the pandemic under control.
The post Why Healthcare… Continue reading Why Healthcare Security Requires an Operation-Centric Approach

Intel Illustrates Its Focus on Transparency in Security with 2020 Product Security Report

I am not sure if you noticed or not, but 2020 was a strange year. The COVID-19 pandemic completely disrupted the business model for most companies and forced an acceleration in digital transformation—even for companies who weren’t planning on, or prepa… Continue reading Intel Illustrates Its Focus on Transparency in Security with 2020 Product Security Report

Gaining Root Access on Sierra Wireless AirLink Devices

Wi-Fi connectivity is increasingly pervasive. Many organizations have embraced Wi-Fi as a primary means of connecting to network applications and resources. It is significantly cheaper and more convenient than having to run ethernet cable throughout th… Continue reading Gaining Root Access on Sierra Wireless AirLink Devices

Intel Teams with Cybereason to Fight Ransomware at the CPU Level

Ransomware has emerged in recent years as one of the most pervasive and effective cyber threats. It is generally easy to automate and execute ransomware attacks, and there is very little risk to the attackers—yet this type of attack enables cybercrimin… Continue reading Intel Teams with Cybereason to Fight Ransomware at the CPU Level

Better Security through the Security Development Lifecycle

In technology circles, the acronym SDL is commonly understood to stand for Software Development Lifecycle. There is another very important “S”, though: Security. Intel recently published a white paper that describes the Security Development Lifecycle—a… Continue reading Better Security through the Security Development Lifecycle