Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom. This is because privileged accounts are widely deployed all across modern business networks — on-premi… Continue reading Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services … Continue reading Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

When CyberTown, USA is fully built out, it’s backers envision it emerging as the world’s premier technology hub for cybersecurity and data science. DataTribe, a Fulton, MD-based cybersecurity startup incubator, has been a key backer of this… Continue reading Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

When CyberTown, USA is fully built out, it’s backers envision it emerging as the world’s premier technology hub for cybersecurity and data science. DataTribe, a Fulton, MD-based cybersecurity startup incubator, has been a key backer of this… Continue reading Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

A security-first mindset is beginning to seep into the ground floor of the IT departments of small and mid-sized companies across the land. Senior executives at these SMBs are finally acknowledging that a check-box approach to security isn’t enou… Continue reading Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

Q&A: Reddit breach shows use of ‘SMS 2FA’ won’t stop privileged access pillaging

The recent hack of social media giant Reddit underscores the reality that all too many organizations — even high-visibility ones that ought to know better —  are failing to adequately lock down their privileged accounts. Related: 6 bes… Continue reading Q&A: Reddit breach shows use of ‘SMS 2FA’ won’t stop privileged access pillaging

Q&A: The troubling implications of normalizing encryption backdoors — for government use

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types of encryption that exist today? We know how Vladmir Putin, Xi Jinping and Kim Jung-un  would answer: “Of course!”… Continue reading Q&A: The troubling implications of normalizing encryption backdoors — for government use

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

Most large enterprises today can point to multi-millions of dollars expended over the past two decades erecting “layered defenses” to protect their digital systems. Yet catastrophic network breaches continue apace. Turns out there’s a… Continue reading Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

Q&A: How your typing and screen swiping nuances can verify your identity

The recent data breaches at Timehop and Macy’s are the latest harbingers of what’s in store for companies that fail to vigorously guard access to all of their mission-critical systems. Related podcast: Why identities are the new firewall A … Continue reading Q&A: How your typing and screen swiping nuances can verify your identity

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

Illicit crypto mining is advancing apace. It was easy to see this coming. It began when threat actors began stealthily embedding crypto mining functionality into the web browsers of unwitting individuals. Cryptojacking was born. And now, the next-level… Continue reading Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers