MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns

Local government agencies remain acutely exposed to being hacked. That’s long been true. However, at this moment in history, two particularly worrisome types of cyber attacks are cycling up and hitting local government entities hard: ransomware s… Continue reading MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns

MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity

A singular topic has risen to the top of the agenda in executive suites and board rooms all across the planet: cybersecurity. Related: Security, privacy fallout of IoT A recent survey by Infosys, a tech consulting and IT services giant based in Bangalo… Continue reading MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity

SHARED INTEL: How digital certificates could supply secure identities for enterprise blockchains

Blockchain gave rise to Bitcoin. But blockchain is much more than just the mechanism behind the cryptocurrency speculation mania. Related: The case for ‘zero trust’ There’s no disputing that blockchain technology holds the potential t… Continue reading SHARED INTEL: How digital certificates could supply secure identities for enterprise blockchains

NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

Hear about the smart toaster that got attacked three times within an hour after its IP address first appeared on the Internet? That experiment conducted by a reporter for The Atlantic crystalizes the seemingly intractable security challenge businesses … Continue reading NEW TECH: Baffin Bay Networks takes a ‘cloud-first’ approach to securing web applications

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

Threat intelligence sharing is such a simple concept that holds so much promise for stopping threat actors in their tracks. So why hasn’t it made more of an impact stopping network breaches? Related: Ground zero for cybersecurity research Having … Continue reading MY TAKE: How advanced automation of threat intel sharing has quickened incident response

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Related: The tie between DevOps and SecOps. Org… Continue reading SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

Europe came down hard this summer on British Airways and Marriott for failing to safeguard their customers’ personal data. The EU slammed the UK airline with a $230 million fine, and then hammered the US hotel chain with a $125 million penalty &#… Continue reading MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks’ analysis of anomalous behaviors

Andrea Carcano’s journey to co-founding a security company in the vanguard of defending critical infrastructure began at a tender age. Related: Why the Golden Age of cyber spying is here Carcano hacked a computer screen at age 14, and that g… Continue reading NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks’ analysis of anomalous behaviors

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

A core security challenge confronts just about every company today. Related: Can serverless computing plus GitOps lock down DX? Companies are being compelled to embrace digital transformation, or DX, if for no other reason than the fear of being left b… Continue reading MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right

It ought to be clear to everyone that personal privacy should be a human right and not a commodity to be bought and sold. Alas, we can’t take it for granted: data breaches put us under fire constantly, revealing everything about us from logs and … Continue reading GUEST ESSAY: The ethical considerations of personal privacy viewed as a human right