From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection

Securing open-source code supply chains may help prevent the next big cyberattack

The headline-making supply chain attack on SolarWinds late last year sent a shock wave through the security community and had many CISOs and security leaders asking: “Is my software supply chain secure?” After months of analysis, we know that many (som… Continue reading Securing open-source code supply chains may help prevent the next big cyberattack

Top 5 cybersecurity considerations for file uploads of vaccination records

As vaccination mandates become more common, immunization records are increasingly required across the world. Organizations are turning to the digital space to upload images of COVID-19 record cards as electronic proof of vaccination. Having a web appli… Continue reading Top 5 cybersecurity considerations for file uploads of vaccination records

An introduction to U.S. data compliance laws

Due to technological advances like the rise of cloud storage and social media, there is an increasing concern over privacy — especially when it comes to how businesses collect and use customer data. While the U.S. does not presently have an all-encompa… Continue reading An introduction to U.S. data compliance laws

Lack of API visibility undermines basic principle of security

One of the oldest principles of security is that you cannot secure what you cannot see. Visibility has always been the starting place for monitoring and protecting attack surface and valuable resources. Various technical challenges have come to bear ov… Continue reading Lack of API visibility undermines basic principle of security

The six most common threats against the device that knows you best

What is the most intimate relationship in your life—aside from your partner, your children or your parents? For many of us, it’s our mobile phone. It’s the last thing we see before sleep, and it’s usually the first thing in our hands each morning… Continue reading The six most common threats against the device that knows you best

Combating cybercrime: Lessons from a CIO and Marine veteran

A colleague asked me recently if I thought the FBI had finally experienced enough of the cyberattacks plaguing the United States and would now more aggressively pursue the attackers. My answer was “no.” Cybercriminals are operating against the United S… Continue reading Combating cybercrime: Lessons from a CIO and Marine veteran

We need a Cyber Awareness Century

For a generation of people that panic if they leave home without their phone or in the event of a social media outage, we are still very unequipped to handle the internet’s possibilities securely. A study conducted by the Taylor & Francis Group fou… Continue reading We need a Cyber Awareness Century

Operational technology and zero trust

Zero trust, otherwise known as zero trust architecture (ZTA), is a shift in the way we think about security. Zero trust is the concept of centralizing policy control, limiting lateral movement throughout the organization, changing from traditional edge… Continue reading Operational technology and zero trust

Leveraging social media background checks to balance friction and risk

With ecommerce revenues higher than ever and estimated to reach $4.89 million in 2021 (per eMarketer), cart abandonment continues to be a major pain point for the industry and adjacent sectors, including payment processors and digital wallets. A closer… Continue reading Leveraging social media background checks to balance friction and risk