NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the o… Continue reading NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the daunting challenge of preserving the… Continue reading MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber at… Continue reading SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

Homomorphic encryption has long been something of a Holy Grail in cryptography. Related: Post-quantum cryptography on the horizon For decades, some of our smartest mathematicians and computer scientists have struggled to derive a third way to keep data… Continue reading NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

Threat actors are opportunistic, well-funded, highly-motivated and endlessly clever. Therefore cybersecurity innovations must take hold both deeper inside and at the leading edges of modern business networks. Related: Lessons learned from Capitol One b… Continue reading MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

NEW TECH: The march begins to make mobile app security more robust than legacy PC security

Is mobile technology on a course to become more secure than traditional computing? Seven or eight years ago, that was a far-fetched notion. Today, the answer to that question is, “Yes, it must, and soon.” Related: Securing the Internet of T… Continue reading NEW TECH: The march begins to make mobile app security more robust than legacy PC security

SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

Keeping track of badness on the Internet has become a thriving cottage industry unto itself. Related: ‘Cyber Pearl Harbor’ is upon us There are dozens technology giants, cybersecurity vendors, government agencies and industry consortiums th… Continue reading SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level

How can it be that marquee enterprises like Capital One, Marriott, Facebook, Yahoo, HBO, Equifax, Uber and countless others continue to lose sensitive information in massive data breaches? Related: Breakdown of Capital One breach The simple answer is t… Continue reading NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level

MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns

Local government agencies remain acutely exposed to being hacked. That’s long been true. However, at this moment in history, two particularly worrisome types of cyber attacks are cycling up and hitting local government entities hard: ransomware s… Continue reading MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

Hear about the smart toaster that got attacked three times within an hour after its IP address first appeared on the Internet? That experiment conducted by a reporter for The Atlantic crystalizes the seemingly intractable security challenge businesses … Continue reading NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications