MY TAKE: How advanced automation of threat intel sharing has quickened incident response

Threat intelligence sharing is such a simple concept that holds so much promise for stopping threat actors in their tracks. So why hasn’t it made more of an impact stopping network breaches? Related: Ground zero for cybersecurity research Having … Continue reading MY TAKE: How advanced automation of threat intel sharing has quickened incident response

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

A core security challenge confronts just about every company today. Related: Can serverless computing plus GitOps lock down DX? Companies are being compelled to embrace digital transformation, or DX, if for no other reason than the fear of being left b… Continue reading MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city’s servers in May. The attackers demanded … Continue reading MY TAKE: A primer on how ransomware arose to the become an enduring scourge

MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security issues posed by BYOD are as complex and difficul… Continue reading MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder o… Continue reading MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

President Trump’s constant mislabeling of mainstream news reports he doesn’t appreciate as “fake news” has done much to muddle the accurate definition of this profound global force – and obscure the societal damage this ri… Continue reading MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever Caz-bees first took shape as a cottage industry circa 2013 to 2014 in response to a cry for help from companie… Continue reading MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

A couple of high-profile distributed denial-of-service (DDoS) attacks will surely go down in history as watershed events – each for different reasons. Related: IoT botnets now available for economical DDoS blasts In March 2013, several impossibly… Continue reading MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

BEST PRACTICES: How to protect yourself from the enduring scourge of malvertising

Malvertising is rearing its ugly head – yet again. Malicious online ads have surged and retreated in cycles since the earliest days of the Internet. Remember when infectious banner ads and viral toolbars cluttered early browsers? Related: Web app… Continue reading BEST PRACTICES: How to protect yourself from the enduring scourge of malvertising

Web application exposures continue to bedevil companies as digital transformation accelerates

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber spies feast on government shutdown Companies are scaling up their use o… Continue reading Web application exposures continue to bedevil companies as digital transformation accelerates