MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web gateways The tech titans have swelled into mul… Continue reading MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

As companies make more extensive use of evermore capable – and complex — digital systems, what has remained constant is the innumerable paths left wide open for threat actors to waltz through. Related: Applying ‘zero trust’ to m… Continue reading MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

Assuring the privacy and security of sensitive data, and then actually monetizing that data, — ethically and efficiently — has turned out to be the defining challenge of digital transformation. Today a very interesting effort to address thi… Continue reading MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at the end of the tunnel. Related… Continue reading GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be addressed before continuing the wide-scale deployment of ad… Continue reading MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security re… Continue reading MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

A report co-sponsored by Lloyd’s of London paints a chilling scenario for how a worldwide cyberattack could trigger economic losses of some $200 billion for companies and government agencies ill-equipped to deflect a very plausible ransomware att… Continue reading MY TAKE: ‘Bashe’ attack theorizes a $200 billion ransomware raid using NSA-class cyber weapons

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 million patients when hackers gained unauthorized access to databases operated by a third-party billing vendor. Turn the corner into 2019 and we find Citigroup, CapitalOne, We… Continue reading NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

Would you back out of a driveway without first buckling up, checking the rear view mirror and glancing behind to double check that the way is clear? Consider that most of us spend more time navigating the Internet on our laptops and smartphones than we… Continue reading MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

MY TAKE: US cyber adversaries take cue from shutdown to accelerate malware deployment

One profound consequence of Donald Trump’s shutdown of the federal government, now in day 33, is what a boon it is to US cyber adversaries. And moving forward, the long run ramifications are likely to be dire, indeed. Related: Welcome to the &#82… Continue reading MY TAKE: US cyber adversaries take cue from shutdown to accelerate malware deployment