MY TAKE: The amazing ways hackers manipulate ‘runtime’ to disguise deep network breaches

There is a concept in computing, called runtime, that is so essential and occurs so ubiquitously that it has long been taken for granted. Now cyber criminals have begun to leverage this heretofore innocuous component of computing to insinuate themselve… Continue reading MY TAKE: The amazing ways hackers manipulate ‘runtime’ to disguise deep network breaches

NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities

Just like the best sourdough bread derives from a “mother” yeast that gets divided, passed around, and used over and over, open-source software applications get fashioned from a  “mother” library of code created and pa… Continue reading NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

If digital transformation, or DX, is to reach its full potential, there must be a security breakthrough that goes beyond legacy defenses to address the myriad new ways threat actors can insinuate themselves into complex digital systems. Network traffic… Continue reading MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

Distributed denial of service (DDoS) attacks continue to erupt all across the Internet showing not the faintest hint of leveling off, much less declining, any time soon. Related video: How DDoS attacks leverage the Internet’s DNA To the contrary,… Continue reading Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

Trend Micro takes multi-pronged approach to narrowing the gaping cybersecurity skills gap

Remember the old adage, you can never be too thin or too rich? The software development world has its own take on that dictum—you can never be too fast. Related: Gamification training targets iGens Business demand dictates a frenetic pace for del… Continue reading Trend Micro takes multi-pronged approach to narrowing the gaping cybersecurity skills gap

GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

More businesses than ever before are choosing to move their IT infrastructure and systems to cloud solutions such as Amazon Web Services and Microsoft Azure. There are many reasons to choose a cloud solution including increased flexibility and scalabil… Continue reading GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to a… Continue reading MY TAKE: The back story on the convergence, continuing evolution of endpoint security

Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

In a move to blanket the Internet with encrypted website traffic, Google is moving forward with its insistence that straggling website publishers adopt HTTPS Secure Sockets Layer (SSL). Related: How PKI can secure IoT Google’s Chrome web browser … Continue reading Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

Q&A: How your typing and screen swiping nuances can verify your identity

The recent data breaches at Timehop and Macy’s are the latest harbingers of what’s in store for companies that fail to vigorously guard access to all of their mission-critical systems. Related podcast: Why identities are the new firewall A … Continue reading Q&A: How your typing and screen swiping nuances can verify your identity

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

Illicit crypto mining is advancing apace. It was easy to see this coming. It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. Cryptojacking was born. And now, the next-level… Continue reading Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers