SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corpor… Continue reading SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

Is America’s working definition of “national security” too narrow for the digital age?
Yes, observes retired Admiral Michael Rogers, who served as a top White House cybersecurity advisor under both Presidents Obama and Trump. 
Re… Continue reading MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. Related: Why Google’s HTTPS pus… Continue reading MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

Less than 48 hours after the killing of Iran’s General Qasem Soleimani, the U.S. Department of Homeland Security issued a bulletin calling out Iran’s “robust cyber program,” and cautioning everyone to be prepared for Iran to &#8… Continue reading MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

MY TAKE: Why we should all now focus on restoring stability to US-Iran relations

As tensions escalate between the U.S. and Iran it’s vital not to lose sight of how we arrived at this point. Related: We’re in the golden age of cyber spying Mainstream news outlets are hyper focused on the events of the past six days. A De… Continue reading MY TAKE: Why we should all now focus on restoring stability to US-Iran relations

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming servi… Continue reading BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live. Jeff Bezos of Amazon, and Larry Page and Sergey Brin of Google did more than anyone else to actualize digital c… Continue reading MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools a… Continue reading NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb… Continue reading SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Da… Continue reading MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation