NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

Cyber criminals are deploying the very latest in automated weaponry, namely botnets, to financially plunder corporate networks. The attackers have a vast, pliable attack surface to bombard: essentially all of the externally-facing web apps, mobile apps… Continue reading NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

A security-first mindset is beginning to seep into the ground floor of the IT departments of small and mid-sized companies across the land. Senior executives at these SMBs are finally acknowledging that a check-box approach to security isn’t enou… Continue reading Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Related: Why a ‘zero-trust’ approach to security is necessary On… Continue reading NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach

The United States has experienced the most cybersecurity breaches in the world and the Equifax Breach was one of the first to be considered a “mega breach.” The headlines immediately attempted to lay the blame, in large part, on the fact th… Continue reading GUEST ESSAY: A guide to implementing best security practices — before the inevitable breach

NEW TECH: Silverfort extends ‘adapative multi-factor authentication’ via key partnerships

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Related: Why a ‘zero-trust’ approach to security is necessary On… Continue reading NEW TECH: Silverfort extends ‘adapative multi-factor authentication’ via key partnerships

GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Being the obvious target that it is, the U.S. Department of Defense presumably has expended vast resources this century on defending its digital assets from perennial cyber attacks. Related: Why carpet bombing email campaigns endure And yet two recent … Continue reading GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

It is disheartening, but not at all surprising, that hackers continue to pull off successful breaches of well-defended U.S. government strategic systems. Related podcast: Cyber attacks on critical systems have only just begun On Friday, Oct. 12, the Pe… Continue reading Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

“May you live in interesting times.” The old Chinese proverb–some consider it a blessing and others a curse–certainly describes the modern-day cyber landscape. Related: 7 attacks that put us at the brink of cyber war In today&#8… Continue reading MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

MY TAKE: The many ways social media is leveraged to spread malware, manipulate elections

Remember how we communicated and formed our world views before Facebook, Twitter, Instagram, Reddit, CNN and Fox News? We met for lunch, spoke on the phone and wrote letters. We got informed, factually, by trusted, honorable sources. Remember Walter Cr… Continue reading MY TAKE: The many ways social media is leveraged to spread malware, manipulate elections

Q&A: Reddit breach shows use of ‘SMS 2FA’ won’t stop privileged access pillaging

The recent hack of social media giant Reddit underscores the reality that all too many organizations — even high-visibility ones that ought to know better —  are failing to adequately lock down their privileged accounts. Related: 6 bes… Continue reading Q&A: Reddit breach shows use of ‘SMS 2FA’ won’t stop privileged access pillaging