MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided?
It’s tempting to place the lion’s share of the blame on feckless political leaders and facile … (more…)
The post MY … Continue reading MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

One legacy of the ongoing global pandemic is that companies now realize that a secured and well-supported remote workforce is possible. Recently, the University of Illinois and the Harvard Business School conducted a study, and 16% of companies reporte… Continue reading GUEST ESSAY: Here’s how Secure Access Service Edge — ‘SASE’ — can help, post Covid-19

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security.
We began the new millennium with on-premises data centers supporting servers and desktops that a technician in sneakers co… Continue reading NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics.
Everything from science and engineering to poetry and music rely on numeric calculations. Albert Einstein once observed that “pure m… Continue reading STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favor… Continue reading MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks.
Related: Welcome to the CyberXchange Marketplace
In the U.S. alone, in fact, there are more than 5,000 … (more… Continue reading GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

MY TAKE: How ‘credential stuffing’ is being deployed to influence elections, steal Covid-19 relief

What do wildfires and credential stuffing have in common?
Related: Automated attacks leverage big data
For several years now, both have flared up and caused harm at the fringes of population centers and our digital economy. And, now, in 2020, … (more…)… Continue reading MY TAKE: How ‘credential stuffing’ is being deployed to influence elections, steal Covid-19 relief

MY TAKE: Lessons learned from the summer of script kiddies hacking Twitter, TikTok

Graham Ivan Clark, Onel de Guzman and Michael Calce. These three names will go down in the history of internet commerce, right alongside Jack Dorsey, Mark Zuckerberg and Jeff Bezos.
Related: How ‘Zero Trust’ is compatible with agile computing
We’re … (… Continue reading MY TAKE: Lessons learned from the summer of script kiddies hacking Twitter, TikTok

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to the metal on projects to switch over to … (more…)
Continue reading NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.
Related: ‘Business logic’ hacks on the rise
Consider that we began this century relying on the legacy “waterfall” software… Continue reading NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF