Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs

A cornucopia of cybersecurity solutions went on public display today as Black Hat USA 2021 convened once more as a live event in Las Vegas.
Related: Kaseya hack raises more supply chain worries
For small- and mid-sized businesses (SMBs) cutting … (more… Continue reading Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs

RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

Much attention has been paid to the widespread failure to detect the insidious Sunburst malware that the SolarWinds hackers managed to slip deep inside the best-defended networks on the planet.
Related: The undermining of the global supply chain
But th… Continue reading RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

It’s accurate to say that security has been bolted onto modern business networks.
It also has become very clear that we won’t achieve the full potential of digital transformation without security somehow getting intricately woven into every layer of co… Continue reading RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

GUEST ESSAY: ‘Cybersecurity specialist’ tops list of work-from-home IT jobs that need filling

Even before the COVID-19 pandemic turned many office workers into work-from-home (WFH) experts, the trend toward working without having to commute was clear.
Related: Mock attacks help SMBs harden defenses
As internet bandwidth has become more availabl… Continue reading GUEST ESSAY: ‘Cybersecurity specialist’ tops list of work-from-home IT jobs that need filling

BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

Technology advancements have made it relatively easy for many employees to carry out their regular job duties from the comfort of their home.
Related: Poll confirms rise of Covid 19-related hacks
This is something companies are under pressure to allow … Continue reading BEST PRACTICES – 9 must-do security protocols companies must embrace to stem remote work risks

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malwa… Continue reading GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks.
Related: The quickening of cyber warfare
The latest twist: mobile network operator UScellular on Jan. 21 disclosed how cybercriminals broke into its Custom… Continue reading ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks.
Related: Digital certificates destined to play key role in securing DX
Thanks to a couple of milestone … Continue reading Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital

Plato once sagely observed, “A good decision is based on knowledge and not on numbers.” 
Related: How a Russian social media site radicalized U.S. youth
That advice resonates today, even as we deepen our reliance on number crunching — … (more…)
The po… Continue reading MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come.
Related: Web apps are … (more…)
The post GUEST ESSAY:… Continue reading GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy