SHARED INTEL: How ‘memory attacks’ and ‘firmware spoilage’ circumvent perimeter defenses

What does Chinese tech giant Huawei have in common with the precocious kid next door who knows how to hack his favorite video game? Related: Ransomware remains a scourge The former has been accused of placing hidden backdoors in the firmware of equipme… Continue reading SHARED INTEL: How ‘memory attacks’ and ‘firmware spoilage’ circumvent perimeter defenses

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

There’s little doubt that the shift to quantum computing  will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Rel… Continue reading SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

From the start, two-factor authentication, or 2FA, established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, and what it evolved into – multi-factor aut… Continue reading NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live. Jeff Bezos of Amazon, and Larry Page and Sergey Brin of Google did more than anyone else to actualize digital c… Continue reading MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools a… Continue reading NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb… Continue reading SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

Digital commerce has come to revolve around two types of identities: human and machine. Great effort has gone into protecting the former, and yet human identities continue to get widely abused by cyber criminals. By comparison, scant effort has gone in… Continue reading SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Da… Continue reading MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. Compromised logins continue to facilitate cyber … Continue reading NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The digital footprints of U.S. consumers’ have long been up for grabs. No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. … Continue reading SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic