National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

The targeting of Sen. Claire McCaskill by Russian intelligency agency hackers, as she runs for re-election, underscores the need for each individual and organization to take online privacy and security as a core part of our everyday lives. Related: Usi… Continue reading National Cybersecurity Alliance advocates ‘shared responsibility’ for securing the Internet

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. One of more fascinating innovators in this space is 11-ye… Continue reading NEW TECH: DataLocker introduces encrypted flash drive — with key pad

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Most individuals today are nonplussed when required, under certain circumstances, to retrieve a … Continue reading As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

Security start-up deploys advanced AI, aka ‘deep learning,’ to detect malware on endpoints

Based in Tel Aviv, Israel, Deep Instinct was one of the more intriguing cybersecurity vendors I had the privilege of spending some time with at RSA Conference 2018. The company lays claims to being the first to apply “deep learning” to a tr… Continue reading Security start-up deploys advanced AI, aka ‘deep learning,’ to detect malware on endpoints

Q&A: How Deep Instinct uses ‘deep learning’ to detect unknown malware on laptops, smartphones

Deep Instinct was one of the more intriguing cybersecurity vendors I had the privilege of spending some time with at RSA Conference 2018. The Tel Aviv, Israel – based company lays claims to being the first to apply “deep learning” to … Continue reading Q&A: How Deep Instinct uses ‘deep learning’ to detect unknown malware on laptops, smartphones

Q&A: How to prepare for Spectre, Meltdown exploits — and next-gen ‘microcode’ attacks

If you think the cyber threat landscape today is nasty, just wait until the battle front drops to the processor chip level. Related artilce: A primer on microcode vulnerabilities It’s coming, just around the corner. The disclosure in early Januar… Continue reading Q&A: How to prepare for Spectre, Meltdown exploits — and next-gen ‘microcode’ attacks

Q&A: Why SMBs should heed lessons from Equifax breach and mitigate ‘open source’ risks

Hackers were able to ransack Equifax last year, and steal personal data for some 143 million citizens, by exploiting a vulnerability in an open-source component, which the credit bureau failed to lock down. The hackers leveraged a vulnerability in some… Continue reading Q&A: Why SMBs should heed lessons from Equifax breach and mitigate ‘open source’ risks

Q&A: What CyberX is doing to help address the hackable state of industrial control systems

Finally, the profoundly hackable state of industrial control systems (ICS) is being elevated as an issue of substantive concern and beginning to get the level of global attention it deserves. Nation-state backed hackers knocking out power grids and dis… Continue reading Q&A: What CyberX is doing to help address the hackable state of industrial control systems