SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can certainly hunt one down online. Now add high-end counterfeit smartphones to the list of luxury consumer items that are being aggressively marketed to … Continue reading SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city’s servers in May. The attackers demanded … Continue reading MY TAKE: A primer on how ransomware arose to the become an enduring scourge

MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security issues posed by BYOD are as complex and difficul… Continue reading MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey i… Continue reading Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The best practices standards an… Continue reading Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

It was in 2012 that CRITICALSTART burst onto the Managed Security Service Provider (MSSP) scene with bold intentions. Related: How SMBs can leverage threat intelligence. The Plano, TX-based company sought to elevate the “MSSP” space high ab… Continue reading NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

Digital transformation is all about high-velocity innovation. But velocity cuts two ways. Related: Obsolescence creeps into perimeter defenses Yes, the rapid integration of digital technologies into all aspects of commerce has enabled wonderful new ser… Continue reading NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder o… Continue reading MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

President Trump’s constant mislabeling of mainstream news reports he doesn’t appreciate as “fake news” has done much to muddle the accurate definition of this profound global force – and obscure the societal damage this ri… Continue reading MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever Caz-bees first took shape as a cottage industry circa 2013 to 2014 in response to a cry for help from companie… Continue reading MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation