GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Being the obvious target that it is, the U.S. Department of Defense presumably has expended vast resources this century on defending its digital assets from perennial cyber attacks. Related: Why carpet bombing email campaigns endure And yet two recent … Continue reading GUEST ESSAY: Pentagon’s security flaws highlighted in GAO audit — and recent data breach

Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

It is disheartening, but not at all surprising, that hackers continue to pull off successful breaches of well-defended U.S. government strategic systems. Related podcast: Cyber attacks on critical systems have only just begun On Friday, Oct. 12, the Pe… Continue reading Guest Essay: Supply chain vulnerabilities play out in latest Pentagon personnel records breach

GUEST ESSAY: A call for immediate, collective action to stem attacks on industrial control systems

As the Industrial Internet of Things continues to transform the global industrial manufacturing and critical infrastructure industries, the threat of aggressive, innovative and dangerous cyber-attacks has become increasingly concerning. Adopting modern… Continue reading GUEST ESSAY: A call for immediate, collective action to stem attacks on industrial control systems

GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

More businesses than ever before are choosing to move their IT infrastructure and systems to cloud solutions such as Amazon Web Services and Microsoft Azure. There are many reasons to choose a cloud solution including increased flexibility and scalabil… Continue reading GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

Understanding today’s cybersecurity landscape is complex. The amount of threats aimed at enterprises is staggering. More than 230,000 new malware samples are launched every day. The average small and medium-size business experiences a cyber attac… Continue reading GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The discovery of sensitive U.S. military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. However, details of the underlying hack, ferreted out and shared by researchers of the Insikt Group, an … Continue reading GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

GUEST ESSAY: Here’s why Tesla has been sabotaged twice in two years — lax network security

The disclosure earlier this week that Tesla CEO Elon Musk reportedly informed all of his employees about a rogue worker conducting “extensive and damaging sabotage” to the company’s operations very much deserves the news coverage it h… Continue reading GUEST ESSAY: Here’s why Tesla has been sabotaged twice in two years — lax network security

GUEST ESSAY: 3 key ingredients to stress-free compliance with data handling regulations

The variety of laws and regulations governing how organizations manage and share sensitive information can look like a bowl of alphabet soup: HIPAA, GDPR, SOX, PCI and GLBA. A multinational conglomerate, government contractor, or public university must… Continue reading GUEST ESSAY: 3 key ingredients to stress-free compliance with data handling regulations

GUEST ESSAY: DHS tackles supply-chain issues over malware-laden smartphones

At the Black Hat security conference last August, researchers from the security firm Kryptowire announced that they’d discovered Amazon’s #1-selling unlocked Android phone, the BLU R1 HD, was sending Personally Identifiable Information (PII… Continue reading GUEST ESSAY: DHS tackles supply-chain issues over malware-laden smartphones

GUEST ESSAY: The Facebook factor: Zuckerberg’s mea culpa reveals intolerable privacy practices

In the words of the Nobel Prize writer Bob Dylan, “The times, they are a-changin.’” Revelations in the press about Facebook’s current privacy problems, and a new comprehensive European Union privacy framework that impacts Americ… Continue reading GUEST ESSAY: The Facebook factor: Zuckerberg’s mea culpa reveals intolerable privacy practices