GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach

The United States has experienced the most cybersecurity breaches in the world and the Equifax Breach was one of the first to be considered a “mega breach.” The headlines immediately attempted to lay the blame, in large part, on the fact th… Continue reading GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach

NEW TECH: Silverfort extends ‘adapative multi-factor authentication’ via key partnerships

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Related: Why a ‘zero-trust’ approach to security is necessary On… Continue reading NEW TECH: Silverfort extends ‘adapative multi-factor authentication’ via key partnerships

GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Being the obvious target that it is, the U.S. Department of Defense presumably has expended vast resources this century on defending its digital assets from perennial cyber attacks. Related: Why carpet bombing email campaigns endure And yet two recent … Continue reading GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

It is disheartening, but not at all surprising, that hackers continue to pull off successful breaches of well-defended U.S. government strategic systems. Related podcast: Cyber attacks on critical systems have only just begun On Friday, Oct. 12, the Pe… Continue reading Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

“May you live in interesting times.” The old Chinese proverb–some consider it a blessing and others a curse–certainly describes the modern-day cyber landscape. Related: 7 attacks that put us at the brink of cyber war In today&#8… Continue reading MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

MY TAKE: The many ways social media is leveraged to spread malware, manipulate elections

Remember how we communicated and formed our world views before Facebook, Twitter, Instagram, Reddit, CNN and Fox News? We met for lunch, spoke on the phone and wrote letters. We got informed, factually, by trusted, honorable sources. Remember Walter Cr… Continue reading MY TAKE: The many ways social media is leveraged to spread malware, manipulate elections

Q&A: The troubling implications of normalizing encryption backdoors — for government use

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? We know how Vladmir Putin, Xi Jinping and Kim Jung-un  would answer: “Of course!”… Continue reading Q&A: The troubling implications of normalizing encryption backdoors — for government use

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

In March 2018, the city of Atlanta fell victim to a ransomware attack that shut down its computer network. City agencies were unable to collect payment. Police departments had to handwrite reports. Years of data disappeared. Related: Political propagan… Continue reading MY TAKE: Poorly protected local government networks cast shadow on midterm elections

MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

Of the many cybersecurity executives I’ve interviewed, Keenan Skelly’s career path may be the most distinctive. Skelly started out as a U.S. Army Explosive Ordnance Disposal (EOD) Technician. “I was on the EOD team that was actually a… Continue reading MY TAKE: Here’s how diversity can strengthen cybersecurity — at many levels

MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?

Over the past couple of decades, some amazing advances in locking down software code have quietly unfolded in, of all places, Hollywood. Related: HBO hack spurs cyber insurance market Makes sense, though. Digital media and entertainment giants like Net… Continue reading MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?