MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder o… Continue reading MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

President Trump’s constant mislabeling of mainstream news reports he doesn’t appreciate as “fake news” has done much to muddle the accurate definition of this profound global force – and obscure the societal damage this ri… Continue reading MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

One way to grasp how digital transformation directly impacts the daily operations of any organization – right at this moment —  is to examine the company’s application environment. Related: How new exposures being created by API … Continue reading NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

Cloud computing 101: basic types and business advantages of cloud-delivered services

If you are looking for a simpler method of managing issues such as storage, software, servers and database, cloud computing could have the answers that your business needs. The cloud is becoming increasingly popular around the world, as organisations a… Continue reading Cloud computing 101: basic types and business advantages of cloud-delivered services

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through an HVAC contractor’s compromised account. C-suite execs across the land sudden… Continue reading NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web gateways The tech titans have swelled into mul… Continue reading MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

When Facebook founder Mark Zuckerberg infamously declared that privacy “is no longer a social norm” in 2010, he was merely parroting a corporate imperative that Google had long since established. That same year, then-Google CEO Eric Schmidt… Continue reading MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at the end of the tunnel. Related… Continue reading GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be addressed before continuing the wide-scale deployment of ad… Continue reading MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security re… Continue reading MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach