Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives.
Related: How a Russian social media app … (… Continue reading Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Cloud migration, obviously, is here to stay.
Related: Threat actors add ‘human touch’ to hacks
To be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. But there’s no doubt that the exodus to a much g… Continue reading Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Enterprise risk management (ERM) is a comparatively new corporate discipline. The basic notion is that in today’s complex operating environment, it is important for businesses to proactively identify operational hazards and have a plan in place t… Continue reading Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.
Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are c… Continue reading NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber at… Continue reading SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey i… Continue reading Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The best practices standards an… Continue reading Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities When antivirus (AV) software first arrived in the late 1980s, the science of combating computer viruses was very straightforward…. Continue reading Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Related: Why we’re in the Golden Age of cyber espionage Enterprises have dumped small fortunes into stocking their SOCs (s… Continue reading Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web gateways The tech titans have swelled into mul… Continue reading MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone