NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used for a $200 billion ransomware caper … Continue reading NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

BEST PRACTICES: 6 physical security measures every company needs

It has never been more important to invest in proper security for your business. Laws surrounding the personal data of individuals such as the General Data Protection Regulation (GDPR) put the onus on companies to ensure that both digital and physical … Continue reading BEST PRACTICES: 6 physical security measures every company needs

NEW TECH: SyncDog vanquishes BYOD risk by isolating company assets on a secure mobile app

The conundrum companies face with the Bring Your Own Device phenomenon really has not changed much since iPhones and Androids first captured our hearts, minds and souls a decade ago. Related: Malvertising threat lurks in all browsers People demand the … Continue reading NEW TECH: SyncDog vanquishes BYOD risk by isolating company assets on a secure mobile app

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information we share with them. But that level of trust goes much deep… Continue reading MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through an HVAC contractor’s compromised account. C-suite execs across the land sudden… Continue reading NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

A common thread runs through the cyber attacks that continue to defeat the best layered defenses money can buy. Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged net… Continue reading MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

As companies make more extensive use of evermore capable – and complex — digital systems, what has remained constant is the innumerable paths left wide open for threat actors to waltz through. Related: Applying ‘zero trust’ to m… Continue reading MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

When Facebook founder Mark Zuckerberg infamously declared that privacy “is no longer a social norm” in 2010, he was merely parroting a corporate imperative that Google had long since established. That same year, then-Google CEO Eric Schmidt… Continue reading MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

Assuring the privacy and security of sensitive data, and then actually monetizing that data, — ethically and efficiently — has turned out to be the defining challenge of digital transformation. Today a very interesting effort to address thi… Continue reading MY TAKE: Can Project Furnace solve DX dilemma by combining serverless computing and GitOps?

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom. This is because privileged accounts are widely deployed all across modern business networks — on-premi… Continue reading Q&A: Here’s why robust ‘privileged access management’ has never been more vital