MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

Is America’s working definition of “national security” too narrow for the digital age?
Yes, observes retired Admiral Michael Rogers, who served as a top White House cybersecurity advisor under both Presidents Obama and Trump. 
Re… Continue reading MY TAKE: Former NSA director says cybersecurity solutions need to reflect societal values

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

Wider use of Internet of Things systems that can make daily living safer, healthier and more convenient is on the immediate horizon. However, to fully capture the benefits of an IoT-centric economy, a cauldron of privacy and security concerns must &#82… Continue reading MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

Along with Richard Stiennon, I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on de… Continue reading BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

Just five years ago, the Public Key Infrastructure, or PKI, was seriously fraying at the edges and appeared to be tilting toward obsolescence. Things have since taken a turn for the better. Related: Why PKI is well-suited to secure the Internet of Thin… Continue reading MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. Related: Why Google’s HTTPS pus… Continue reading MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

When it comes to defending their networks, most companies have had it drilled into them, by now, that it’s essential to erect layered defenses. Related:Promise vs. pitfalls of IoT For small- and mid-sized businesses, firewalls, antivirus suites a… Continue reading NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

Less than 48 hours after the killing of Iran’s General Qasem Soleimani, the U.S. Department of Homeland Security issued a bulletin calling out Iran’s “robust cyber program,” and cautioning everyone to be prepared for Iran to &#8… Continue reading MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

MY TAKE: Why we should all now focus on restoring stability to US-Iran relations

As tensions escalate between the U.S. and Iran it’s vital not to lose sight of how we arrived at this point. Related: We’re in the golden age of cyber spying Mainstream news outlets are hyper focused on the events of the past six days. A De… Continue reading MY TAKE: Why we should all now focus on restoring stability to US-Iran relations

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. This includes protection from natural disasters, theft, va… Continue reading GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

In 2019, we’ve seen a surge in domain name service (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.’s Cybersecurity Centre, ICANN, and other notable security experts. Although, t… Continue reading GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures