MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

Some 20 years ago, the founders of Amazon and Google essentially set the course for how the internet would come to dominate the way we live. Jeff Bezos of Amazon, and Larry Page and Sergey Brin of Google did more than anyone else to actualize digital c… Continue reading MY TAKE: How blockchain technology came to seed the next great techno-industrial revolution

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb… Continue reading SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. Compromised logins continue to facilitate cyber … Continue reading NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The digital footprints of U.S. consumers’ have long been up for grabs. No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful disclosure. … Continue reading SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

Cloud Access Security Brokers – aka “caz-bees” — have come a long way in a short time. CASBs, a term coined by tech industry consultancy Gartner, first cropped about seven years ago to help organizations enforce security and gov… Continue reading MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the o… Continue reading NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber at… Continue reading SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

Sharing intelligence for the greater good is an essential component of making Internet-centric commerce as safe and as private as it needs to be. Related: Automating threat feed analysis Peerlyst is another step in that direction. Started by infosec pr… Continue reading MY TAKE: Peerlyst shares infosec intel; recognizes Last Watchdog as a top cybersecurity influencer

NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

Homomorphic encryption has long been something of a Holy Grail in cryptography. Related: Post-quantum cryptography on the horizon For decades, some of our smartest mathematicians and computer scientists have struggled to derive a third way to keep data… Continue reading NEW TECH: Breakthrough ‘homomorphic-like’ encryption protects data in-use, without penalties

SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds

Keeping track of badness on the Internet has become a thriving cottage industry unto itself. Related: ‘Cyber Pearl Harbor’ is upon us There are dozens technology giants, cybersecurity vendors, government agencies and industry consortiums th… Continue reading SHARED INTEL: Here’s one way to better leverage actionable intel from the profusion of threat feeds