MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security issues posed by BYOD are as complex and difficul… Continue reading MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey i… Continue reading Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The best practices standards an… Continue reading Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

It was in 2012 that CRITICALSTART burst onto the Managed Security Service Provider (MSSP) scene with bold intentions. Related: How SMBs can leverage threat intelligence. The Plano, TX-based company sought to elevate the “MSSP” space high ab… Continue reading NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

Digital transformation is all about high-velocity innovation. But velocity cuts two ways. Related: Obsolescence creeps into perimeter defenses Yes, the rapid integration of digital technologies into all aspects of commerce has enabled wonderful new ser… Continue reading NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder o… Continue reading MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever Caz-bees first took shape as a cottage industry circa 2013 to 2014 in response to a cry for help from companie… Continue reading MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

Identity governance and administration, or IGA, has suddenly become a front-burner matter at many enterprises. Related: Identity governance issues in the age of digital transformation This is, in large part, because the complexity of business networks … Continue reading BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore