NEW TECH: DataLocker introduces encrypted flash drive — with key pad

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. One of more fascinating innovators in this space is 11-ye… Continue reading NEW TECH: DataLocker introduces encrypted flash drive — with key pad

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

Understanding today’s cybersecurity landscape is complex. The amount of threats aimed at enterprises is staggering. More than 230,000 new malware samples are launched every day. The average small and medium-size business experiences a cyber attac… Continue reading GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

MY TAKE: Here’s why identities are the true firewalls, especially as digital transformation unfolds

Was it really that long ago that company networks were comprised of a straightforward cluster of servers, data bases, applications and user devices corralled largely on premises? Related article: Taking a ‘zero-trust’ approach to authentica… Continue reading MY TAKE: Here’s why identities are the true firewalls, especially as digital transformation unfolds

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

If you’re not familiar with how Facebook, Twitter and YouTube make it so easy for you and me to easily access cool content they’ve collected and stored behind their respective firewalls, then you might think “API” is a trendy ty… Continue reading MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

Companies need CASBs now more than ever — to help secure ‘digital transformation’

When I first wrote about Cloud Access Security Brokers in 2015, so-called CASBs were attracting venture capital by the truckloads — and winning stunning customer testimonials. CASBs (pronounced caz-bees) originally sought to resolve a fast rising… Continue reading Companies need CASBs now more than ever — to help secure ‘digital transformation’

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

There’s a new breed of identity thief at work plundering consumers and companies. However, these fraudsters don’t really care about snatching up your credentials or mine. By now, your personal information and mine has been hacked multiple t… Continue reading How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The discovery of sensitive U.S. military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. However, details of the underlying hack, ferreted out and shared by researchers of the Insikt Group, an … Continue reading GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

MY TAKE: These 7 nation-state backed hacks have put us on the brink of a global cyber war

Nation-state backed hacking collectives have been around at least as long as the Internet. However, evidence that the ‘golden age’ of cyber espionage is upon us continues to accumulate as the first half of 2018 comes to a close. Related pod… Continue reading MY TAKE: These 7 nation-state backed hacks have put us on the brink of a global cyber war

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Most individuals today are nonplussed when required, under certain circumstances, to retrieve a … Continue reading As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

MY TAKE: Knowing these 5 concepts will protect you from illicit cryptocurrency mining

The cryptocurrency craze rages on, and one unintended consequence is the dramatic rise of illicit cryptocurrency mining. It takes computing power to transform digital calculations into crypto cash, whether it be Bitcoin or one of the many other forms o… Continue reading MY TAKE: Knowing these 5 concepts will protect you from illicit cryptocurrency mining