MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

If digital transformation, or DX, is to reach its full potential, there must be a security breakthrough that goes beyond legacy defenses to address the myriad new ways threat actors can insinuate themselves into complex digital systems. Network traffic… Continue reading MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

No one in cybersecurity refers to “antivirus” protection any more. The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to a… Continue reading MY TAKE: The back story on the convergence, continuing evolution of endpoint security

Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

In a move to blanket the Internet with encrypted website traffic, Google is moving forward with its insistence that straggling website publishers adopt HTTPS Secure Sockets Layer (SSL). Related: How PKI can secure IoT Google’s Chrome web browser … Continue reading Q&A: Here’s how Google’s labeling HTTP websites “Not Secure” will strengthen the Internet

Mobile security advances to stopping device exploits — not just detecting malicious apps

The most profound threat to corporate networks isn’t the latest, greatest malware. It’s carbon-based life forms. Humans tend to be gullible and impatient. With our affiliations and preferences put in play by search engines and social media,… Continue reading Mobile security advances to stopping device exploits — not just detecting malicious apps

NEW TECH: Acalvio weaponizes deception to help companies turn the tables on malicious hackers

Differentiating itself in a forest of cybersecurity vendors has not been a problem for start-up Acalvio Technologies. While hundreds of other security companies tout endless types and styles of intrusion detection and prevention systems, Acalvio has st… Continue reading NEW TECH: Acalvio weaponizes deception to help companies turn the tables on malicious hackers

How ‘identity governance’ addresses new attack vectors opened by ‘digital transformation’

Mark McClain and Kevin Cunningham didn’t rest for very long on their laurels, back in late 2003, after they had completed the sale of Waveset Technologies to Sun Microsystems. Waveset at the time was an early innovator in the then-nascent identit… Continue reading How ‘identity governance’ addresses new attack vectors opened by ‘digital transformation’

PODCAST: Can ‘gamification’ of cyber training help shrink the human attack vector?

The human attack vector remains the most pervasively probed path for malicious hackers looking to gain a foothold inside a company’s firewall. And yet, somehow, cyber awareness training has not kept pace. Circadence hopes to change that. The Boul… Continue reading PODCAST: Can ‘gamification’ of cyber training help shrink the human attack vector?

MY TAKE: Why Google’s move to label non-HTTPS sites ‘not secure’ is a good thing

San Francisco-based Cloudflare has traversed an interesting path to becoming a leading cybersecurity vendor. Back in 2004, Matthew Prince and Lee Holloway concocted something called Project Honey Pot to detect and deter email spammers. Prince’s H… Continue reading MY TAKE: Why Google’s move to label non-HTTPS sites ‘not secure’ is a good thing

MY TAKE: Epiphany strikes Amazon, Google, Microsoft about who bears burden for cloud security

Amazon and Google last week very quietly made some moves that signal they’ve been hit by the identical epiphany: they each need to do a helluva lot more to secure cloud computing. Microsoft was hit by this lightning bolt about a year ago. The Red… Continue reading MY TAKE: Epiphany strikes Amazon, Google, Microsoft about who bears burden for cloud security

Q&A: What CyberX is doing to help address the hackable state of industrial control systems

Finally, the profoundly hackable state of industrial control systems (ICS) is being elevated as an issue of substantive concern and beginning to get the level of global attention it deserves. Nation-state backed hackers knocking out power grids and dis… Continue reading Q&A: What CyberX is doing to help address the hackable state of industrial control systems