MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

If digital transformation, or DX, is to reach its full potential, there must be a security breakthrough that goes beyond legacy defenses to address the myriad new ways threat actors can insinuate themselves into complex digital systems. Network traffic… Continue reading MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

Distributed denial of service (DDoS) attacks continue to erupt all across the Internet showing not the faintest hint of leveling off, much less declining, any time soon. Related video: How DDoS attacks leverage the Internet’s DNA To the contrary,… Continue reading Here’s how anyone with $20 can hire an IoT botnet to blast out a week-long DDoS attack

Trend Micro takes multi-pronged approach to narrowing the gaping cybersecurity skills gap

Remember the old adage, you can never be too thin or too rich? The software development world has its own take on that dictum—you can never be too fast. Related: Gamification training targets iGens Business demand dictates a frenetic pace for del… Continue reading Trend Micro takes multi-pronged approach to narrowing the gaping cybersecurity skills gap

GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

More businesses than ever before are choosing to move their IT infrastructure and systems to cloud solutions such as Amazon Web Services and Microsoft Azure. There are many reasons to choose a cloud solution including increased flexibility and scalabil… Continue reading GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to a… Continue reading MY TAKE: The back story on the convergence, continuing evolution of endpoint security

Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

In a move to blanket the Internet with encrypted website traffic, Google is moving forward with its insistence that straggling website publishers adopt HTTPS Secure Sockets Layer (SSL). Related: How PKI can secure IoT Google’s Chrome web browser … Continue reading Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

Q&A: How your typing and screen swiping nuances can verify your identity

The recent data breaches at Timehop and Macy’s are the latest harbingers of what’s in store for companies that fail to vigorously guard access to all of their mission-critical systems. Related podcast: Why identities are the new firewall A … Continue reading Q&A: How your typing and screen swiping nuances can verify your identity

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

Illicit crypto mining is advancing apace. It was easy to see this coming. It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. Cryptojacking was born. And now, the next-level… Continue reading Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. One of more fascinating innovators in this space is 11-ye… Continue reading NEW TECH: DataLocker introduces encrypted flash drive — with key pad

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

Understanding today’s cybersecurity landscape is complex. The amount of threats aimed at enterprises is staggering. More than 230,000 new malware samples are launched every day. The average small and medium-size business experiences a cyber attac… Continue reading GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape