NEW TECH: Can MPC — Multi Party Computation — disrupt encryption, boost cloud commerce?

Encryption is a cornerstone of digital commerce. But it has also proven to be a profound constraint on the full blossoming of cloud computing and the Internet of Things.
Related: A ‘homomorphic-like’ encryption solution
We know very well ho… Continue reading NEW TECH: Can MPC — Multi Party Computation — disrupt encryption, boost cloud commerce?

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last.
Related: Digital Transformation gives SIEMs a second wind
After an initial failure to live up to their overhyped … Continue reading NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

When it comes to defending their networks, most companies have had it drilled into them, by now, that it’s essential to erect layered defenses. Related:Promise vs. pitfalls of IoT For small- and mid-sized businesses, firewalls, antivirus suites a… Continue reading NEW TECH: CyCognito employs offensive bot network to put companies a step a head of attackers

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming servi… Continue reading BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

From the start, two-factor authentication, or 2FA, established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, and what it evolved into – multi-factor aut… Continue reading NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools a… Continue reading NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb… Continue reading SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

Digital commerce has come to revolve around two types of identities: human and machine. Great effort has gone into protecting the former, and yet human identities continue to get widely abused by cyber criminals. By comparison, scant effort has gone in… Continue reading SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. Compromised logins continue to facilitate cyber … Continue reading NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The digital footprints of U.S. consumers’ have long been up for grabs. No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. … Continue reading SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic