NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper … Continue reading NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

It’s hard to believe this month marks the 20th anniversary of the release of the devastating Melissa email virus which spread around the globe in March 1999. Related: The ‘Golden Age’ of cyber espionage is upon us Melissa was hidden i… Continue reading NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

MY TAKE: What the Ethiopian 737 Max 8 crash should tell us about the safety of ‘smart’ jetliners

When news broke about the crash of a Ethiopian Airlines Boeing 737, the first question that popped into my head was whether an older 737 model, still using the flawed rudder actuator, might have been involved. Related: Historical context of the rudder … Continue reading MY TAKE: What the Ethiopian 737 Max 8 crash should tell us about the safety of ‘smart’ jetliners

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

A common thread runs through the cyber attacks that continue to defeat the best layered defenses money can buy. Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged net… Continue reading MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web gateways The tech titans have swelled into mul… Continue reading MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

As companies make more extensive use of evermore capable – and complex — digital systems, what has remained constant is the innumerable paths left wide open for threat actors to waltz through. Related: Applying ‘zero trust’ to m… Continue reading MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

When Facebook founder Mark Zuckerberg infamously declared that privacy “is no longer a social norm” in 2010, he was merely parroting a corporate imperative that Google had long since established. That same year, then-Google CEO Eric Schmidt… Continue reading MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

Back in 2004, when I co-wrote this USA TODAY cover story about spam-spreading botnets, I recall advising my editor to expect cybersecurity to be a headline-grabbing topic for a year or two more, tops. Related:  A primer on machine-identity exposur… Continue reading MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

Assuring the privacy and security of sensitive data, and then actually monetizing that data, — ethically and efficiently — has turned out to be the defining challenge of digital transformation. Today a very interesting effort to address thi… Continue reading MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be addressed before continuing the wide-scale deployment of ad… Continue reading MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition