How You Get There Matters — Middle-mile Visibility to Drive CDN Strategy

How You Get There Matters: "Middle-Mile" RUM to Drive CDN Strategy Traditional RUM products make use of APIs (Navigation-Timing, Resource-Timing, etc.) built into browsers to help measure the performance characteristics of the loading of a web … Continue reading How You Get There Matters — Middle-mile Visibility to Drive CDN Strategy

?Pain and Progress? in Managing Digital Risk

Recently, RSA® commissioned the Cybersecurity and Business Risk Survey, executed by Enterprise Strategy Group (ESG), to learn more about the challenges and priorities of IT security and business risk professionals. ?Pain and Progress: The RSA Cybe… Continue reading ?Pain and Progress? in Managing Digital Risk

CISOs Who Deliver a Compelling Narrative Stand a Better Chance of Expanding Their IT Security Budgets

Chief Information Security Officers (CISOs) have historically chafed at budget constraints, with some pushing the envelope and bringing the case for stronger cyber defenses to the board room. New research indicates that executive decision-makers w… Continue reading CISOs Who Deliver a Compelling Narrative Stand a Better Chance of Expanding Their IT Security Budgets

Are We Taking Our Online Privacy Seriously Enough?

Technology has become the lens through which we perceive and experience day-to-day life. Take the smartphone as an example. What used to be a technological rarity and business-oriented tool has become the nexus of our personal and recreational lives. P… Continue reading Are We Taking Our Online Privacy Seriously Enough?

How the Blockchain Is Helping Secure IoT Technology

For those reading this who were cognizant of such topics as the Internet of Things (IoT) and security architecture back in 2016, you may have had some passing knowledge of the Mirai botnet attacks that showed us all just how risky the present client-se… Continue reading How the Blockchain Is Helping Secure IoT Technology

Let’s stop talking about password strength

Picture from EFF — CC-BY license

Near the top of most security recommendations is to use “strong passwords”. We need to stop doing this.
Yes, weak passwords can be a problem. If a website gets hacked, weak passwords are easier to crack. It’s … Continue reading Let’s stop talking about password strength