MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

Cloud Access Security Brokers – aka “caz-bees” — have come a long way in a short time. CASBs, a term coined by tech industry consultancy Gartner, first cropped about seven years ago to help organizations enforce security and gov… Continue reading MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

To pay or not to pay? That’s the dilemma hundreds of organizations caught in the continuing surge of crippling ransomware attacks have faced. Related: How ransomware became such a scourge The FBI discourages it, as you might have guessed. What&#8… Continue reading SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the o… Continue reading NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the daunting challenge of preserving the… Continue reading MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber at… Continue reading SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be. Related: Automating threat feed analysis Peerlyst is another step in that direction. Started by infosec pr… Continue reading MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

Homomorphic encryption has long been something of a Holy Grail in cryptography. Related: Post-quantum cryptography on the horizon For decades, some of our smartest mathematicians and computer scientists have struggled to derive a third way to keep data… Continue reading NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

Threat actors are opportunistic, well-funded, highly-motivated and endlessly clever. Therefore cybersecurity innovations must take hold both deeper inside and at the leading edges of modern business networks. Related: Lessons learned from Capitol One b… Continue reading MY TAKE: ‘Perimeter-less’ computing requires cyber defenses to extend deeper, further forward

NEW TECH: The march begins to make mobile app security more robust than legacy PC security

Is mobile technology on a course to become more secure than traditional computing? Seven or eight years ago, that was a far-fetched notion. Today, the answer to that question is, “Yes, it must, and soon.” Related: Securing the Internet of T… Continue reading NEW TECH: The march begins to make mobile app security more robust than legacy PC security

NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level

How can it be that marquee enterprises like Capital One, Marriott, Facebook, Yahoo, HBO, Equifax, Uber and countless others continue to lose sensitive information in massive data breaches? Related: Breakdown of Capital One breach The simple answer is t… Continue reading NEW TECH: How ‘cryptographic splitting’ bakes-in security at a ‘protect-the-data-itself’ level