GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

Modern cyber threats often are not obvious – in fact it is common for them to lurk inside a business’ systems for a long time without anyone noticing. This is referred to as ‘dwell time’, and a recent report from the Ponemon Ins… Continue reading GUEST ESSAY: The case for engaging in ‘threat hunting’ — and how to do it effectively

NetSecOPEN names founding members, appoints inaugural board of directors

SAN JOSE, Calif. – Dec. 11, 2018 – NetSecOPEN, the first industry organization focused on the creation of open, transparent network security performance testing standards, today announced that 11 prominent security vendors, test solutions a… Continue reading NetSecOPEN names founding members, appoints inaugural board of directors

GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

The United States Intelligence Community, or IC, is a federation of 16 separate U.S. intelligence agencies, plus a 17th administrative office. The IC gathers, stores and processes large amounts of data, from a variety of sources,  in order to prov… Continue reading GUEST ESSAY: 5 security steps all companies should adopt from the Intelligence Community

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. But smart homes, smart workplaces and smart shopping malls are just the warm-up act. Get ready for smart ground transportation. R… Continue reading MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

Michigan is known as the Wolverine State in deference to the ornery quadruped that roams its wild country. However, after a recent visit to Detroit, Ann Arbor and Grand Rapids as a guest of the Michigan Economic Development Corp., or MEDC, I’m pr… Continue reading MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

A security-first mindset is beginning to seep into the ground floor of the IT departments of small and mid-sized companies across the land. Senior executives at these SMBs are finally acknowledging that a check-box approach to security isn’t enou… Continue reading Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

Tel Aviv, Israel-based Silverfort continues to make inroads into proving the efficacy of its innovative approach to multi-factor authentication, or MFA, in corporate settings. Related: Why a ‘zero-trust’ approach to security is necessary On… Continue reading NEW TECH: How ‘adaptive multi-factor authentication’ is gaining traction via partnerships

MY TAKE: Here’s why we need ‘SecOps’ to help secure ‘Cloud Native’ companiess

For many start-ups, DevOps has proven to be a magical formula for increasing business velocity. Speed and agility is the name of the game — especially for Software as a Service (SaaS) companies. Related: How DevOps enabled the hacking of Uber Dev… Continue reading MY TAKE: Here’s why we need ‘SecOps’ to help secure ‘Cloud Native’ companiess

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

Most large enterprises today can point to multi-millions of dollars expended over the past two decades erecting “layered defenses” to protect their digital systems. Yet catastrophic network breaches continue apace. Turns out there’s a… Continue reading Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities

Just like the best sourdough bread derives from a “mother” yeast that gets divided, passed around, and used over and over, open-source software applications get fashioned from a  “mother” library of code created and pa… Continue reading NEW TECH: WhiteSource leverages automation to mitigate lurking open-source vulnerabilities