What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2017-11-21 07:48:10 GUEST ESSAY: The top 4 cybersecurity certificates every IT staffer should have (lien direct) Assuredly, it is a very positive development that more companies are looking to boost the security expertise of their in-house IT teams. This is being manifested by flow of IT professionals seeking out and participating in security-related certificate programs. Numerous third-party organizations offer these educational tracks; a select few garner great respect within the field. […]
Blog.webp 2017-11-20 20:12:25 Q&A: Meet insurance underwriters newest obsession - vulnerability assessments (lien direct) From very early on, cyber criminals have been smart enough to focus their attention on vulnerabilities – the endless coding weak points arising from our increasing dependence on complex software and software-run systems. Finally, the good guys are doing the same. One security vendor I recently spoke to — Risk Based Security – is among […]
Blog.webp 2017-11-17 00:10:01 PODCAST: The coming spike in \'GPS jamming\' and \'GPS spoofing\' (lien direct) If you're like me, you've become obsessed with using GPS to find your way around town. Personally, I'd peg the accuracy of my GPS usage, locally and while on business travel, at roughly 85 percent, which is pretty darn good. GPS isn't infallible, of course. Just ask the woman in Port Jervis, New York who, […]
Blog.webp 2017-11-14 09:49:02 GUEST ESSAY: A call for rethinking incidence response playbooks (lien direct) We see it week after week. Insidious cyber threats that spread throughout enterprises like wildfire and proliferate around the globe, interfering with crucial work and holding data hostage. These attacks make the news cycle for a few days, security teams wring their hands over it, and then forget all about it – until the next […]
Blog.webp 2017-11-13 23:13:47 MY TAKE: Why \'machine learning\' is perfectly suited to mitigating network breaches (lien direct) The essence of  “machine learning” is that ML is perfectly suited to extracting value from large sets of data. Thus, whether you realize it or not, ML has come to intersect with just about every aspect of daily living. ML today is used pervasively to profile our online behaviors. When we search for something on […]
Blog.webp 2017-11-12 20:15:50 MY TAKE: How I came to cover two great \'beats\' in my journalism career (lien direct) I've had the great good fortune to spend most of my career as a “beat reporter” covering two astounding beats. The articles you see here on LastWatchdog are the work of my second great beat, which I've been immersed in since approximately 2004: cybersecurity. Or to put a finer point on it, I live and […]
Blog.webp 2017-11-08 07:01:07 PODCAST: The quest for relevant, actionable threat intelligence (lien direct) In the war on cyber crime, access to rich stores of threat intelligence has never really been the problem. Quasi-government entities, like the United States Computer Emergency and Readiness Team (US-CERT,) and industry sharing groups, like the Information Sharing and Analysis Centers (ISACS,) supply a rich baseline of threat data. Related video: Why the NIST […]
Blog.webp 2017-11-07 22:02:24 VIDEO: The way forward, despite overwhelming cyber threats (lien direct) NEW YORK CITY – Cyber Connect 2017 cybersecurity summit that just wrapped up at the beautiful Grand Hyatt located adjacent to Grand Central Station here in the Big Apple. I got the chance to be on the other side of the interview, sitting down with John Furrier and David Vellante, co-hosts of The Cube. We […]
Blog.webp 2017-11-07 07:33:10 GUEST ESSAY: “Chess Master Project\' should restore resiliency to U.S. power grid (lien direct) By Paul Meyer The evolving risk of a coordinated, catastrophic, cyberattack on U.S. energy delivery systems (collectively known as “the power grid”) via vulnerable Industrial Control Systems (ICS), resulting in wide spread, prolonged power outages, is not a new concern to energy industry executives or government policy makers. Owners and operators of energy sector assets […]
Blog.webp 2017-11-06 19:56:42 Q&A: How the \'PKI ecosystem\' could be the answer to securing the Internet of Things (lien direct) Google is making a big push to compel website publishers to jettison HTTP and adopt HTTPS Transport Layer Security (TLS) as a de facto standard, and it’s expanding use of this important encryption technology. Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), are the underpinnings of secure online transactions. They come into […]
Blog.webp 2017-11-06 09:47:46 Q&A: Savvy companies discover why locking down \'privileged access\' boosts security (lien direct) By Byron V. Acohido Now is a terrific time for organizations to begin getting a much better grip on who has what level of access to sensitive nooks and crannies of the company network. Wider, deeper use of Internet-centric systems has boosted corporate productivity to remarkable levels. Yet the rapidly growing complexity of corporate networks […]
Blog.webp 2017-11-04 20:38:16 PODCAST: \'Homomorphic encryption\' emerges as the Holy Grail of cloud computing (lien direct) By Byron V. Acohido I recently learned that there is an acute limitation to otherwise empowering cloud storage and processing services, such as Amazon EC2, Google Cloud and Microsoft Azure. It has to do with the circumstances under which business data gets transported to, and stored in, cloud storage facilities. Some context: Organizations today do […]
Blog.webp 2017-11-01 22:08:31 GUEST ESSAY: How safeguarding user credentials can lower cyber insurance premiums (lien direct) By Dean Thompson According to Lloyd's of London, a massive global cyberattack could result in economic losses as high as $53 billion. Given that, it's no surprise that an increasing number of businesses are adding cybersecurity coverage to their liability insurance. But as businesses rush to insure, the cost and precise scope of coverage of […]
Blog.webp 2017-11-01 19:27:36 PODCAST: Why \'defense in depth\' isn\'t enough - how \'SOAR\' will help (lien direct) By Byron V. Acohido “Defense in depth” and “layered defenses” just aren't cutting it anymore. We've arrived at a point where many companies have invested substantial fortunes on overlapping tiers of cybersecurity technologies. Discreet systems, such as firewalls, anti-malware  suites and sandbox detonators are smarter and more sophisticated than ever before. Yet network breaches continue […]
Blog.webp 2017-10-31 07:41:37 Q&A: Cisco privacy chief Dennedy says good privacy practices can improve bottom line (lien direct) By Byron V. Acohido When Facebook founder Mark Zuckerberg infamously declared that privacy “is no longer a social norm” in 2010, he was merely parroting a corporate imperative that Google had long since established. That same year, then-Google CEO Eric Schmidt publicly admitted that Google's privacy policy was to “get right up to the creepy […]
Blog.webp 2017-10-30 20:16:00 PODCAST: How Russia\'s election meddling relates to industrial control hacks (lien direct) By Byron  V. Acohido While America's attention has been  riveted on stunning disclosures of how Russia meddled in the U.S. presidential elections, the significance of a parallel, equally important development, may have gotten lost. Don't look now folks, but the world's superpowers are steadily marshaling forces to engage in an all-out cyber war. History may […]
Blog.webp 2017-10-25 07:14:50 PODCAST: Will 2018 be the year of the CISO? (lien direct) By Byron V. Acohido Could we be entering the Golden Age of CISOs, chief information security officers? Perhaps. CISOs at some big financial services firms have begun elbowing their way into the C-suite's upper most tier, reporting to the board of directors and/or the CEO and/or the audit committee, John Dixon, principal at Denim Group, […]
Blog.webp 2017-10-24 07:01:56 GUEST ESSAY: A call to reinvent security by following the \'Three Ways of DevOps\' (lien direct) By Jeff Williams How do you know that your bank's software is secure? Your airline? Your government? The average application has 26.7 serious vulnerabilities, 82% of breaches in financial organizations are due to applications, and the average breach costs $4 million. With roughly 20 million developers worldwide, we're producing vulnerable code faster than ever before. […]
Blog.webp 2017-10-23 07:46:07 PODCAST: The death of BYOD; how mobile security has impacted enterprise security (lien direct) By Byron V. Acohido Just five years ago, BYOD – Bring Your Own Device – was a rising security concern attracting an inordinate amount of attention. Fast forward to today and BYOD has faded as a buzzword. However, employees' use of mobile devices and web apps remains as big a security concern as ever. Related […]
Blog.webp 2017-10-18 21:04:50 PODCAST: How \'Identity Access Management\' – IAM – authenticates network connections (lien direct) By Byron V.  Acohido From the start of this 21st century companies continually scrambled to embrace ever more complex digital systems. Business networks connect an astounding variety of devices than to a vast array of tools and services residing on company premises and in the Internet cloud. An amazing cascade of logons and digital handshakes […]
Blog.webp 2017-10-17 07:42:23 5 deadly sins for which companies reap their just reward: data breaches (lien direct) By Morey Haber I love statistics. They are a valuable commodity in a discussion to formalize a point and validate your position. Many times, others will question the source, accuracy, or even meaning of a statistic to skew the results in their favor. In addition, a statistic taken out of context, or viewed on its […]
Blog.webp 2017-10-14 15:54:10 PODCAST: Cyber forensic technology helps law enforcement keep terrorists in check (lien direct) By Byron V. Acohido For every horrific act of terrorism that gets carried out there are very likely dozens of plots that get thwarted by authorities using leading-edge cyber forensics tools to track malicious threat actors as that they communicate and transact across the Internet. Nuix is a Sydney, Australia-based company that supplies a well-established […] Guideline
Blog.webp 2017-10-13 07:29:08 PODCAST: Core Security makes the case for penetration testing as an essential layer of defending networks (lien direct) By Byron V. Acohido The Equifax debacle has a lot to teach us about how – and how not to – handle a data breach. The massive breach resulted in hackers accessing the social security numbers, birth dates, home addresses and driving license numbers for up to 143 million Americans and the credit card numbers […] Equifax
Blog.webp 2017-10-12 20:56:38 PODCAST: How Cyxtera came to bring a security-first approach to colocation datacenters (lien direct) By Byron V. Acohido Cyxtera is a colocation datacenter business with a fascinating pedigree and a new, security-first,  approach to datacenter services. I spent some time with Randy Rowland, Chief Product Officer at Black Hat 2017 in Las Vegas to hear more about the trajectory of the business to date. Colocation data centers are facilities […]
Blog.webp 2017-10-11 23:09:03 GUEST ESSAY: Trump\'s Cybersecurity Executive Order is Only a Start (lien direct) By Robert Ackerman Jr. President Trump in early July signed a cybersecurity executive order (EO) outlining plans to improve data security for federal agencies and to better protect critical U.S. infrastructure. I view it as a call to action, more than past administrations have done. This alone makes it worthwhile. But it’s just a start. […]
Blog.webp 2017-10-09 23:20:56 PODCAST: Privacy dilemma – do the iPhone X\'s facial recognition capabilities go too far ? (lien direct) By Byron V. Acohido The release of the new iPhone X (don't call it 'X,' say 'ten'or iPhone X), with its facial identification activation feature, has sparked interest in the latest developments in biometric security. I spoke with Corey Nachreiner, chief technology officer of WatchGuard Technology, about the advantages – and risks – involved in […]
Blog.webp 2017-10-02 17:49:11 ROUNDTABLE: The implications of Deloitte data breach, especially following hacks of Equifax, SEC (lien direct) By Byron V. Acohido The astonishing rash of disclosures of data breaches at top-tier organizations continues. Big Four accounting firm Deloitte has joined Equifax and the U.S. Securities and Exchange Commission in going public about a catastrophic loss of sensitive data. Ironically, Deloitte a few years ago branched from its core auditing and tax services […] Equifax Deloitte
Blog.webp 2017-10-02 17:29:15 PODCAST: The case for making \'application security\' a top priority (lien direct) By Byron V. Acohido Convenience has its price. The truism rears its head often in cybersecurity, particularly as web applications delivered via the internet cloud have come to pervade digital commerce. Nearly all businesses and government organizations now offer services-such as online payments-through web applications. And the staggering amount of data flowing through such applications […]
Blog.webp 2017-09-28 16:14:36 PODCAST: Startup FFRI unveils high-flying approach to detecting leading-edge malware (lien direct) By Byron V. Acohido Over the past 10 years or so, machine learning has come to dominate our digital lives. Commercial entities crunch mountains of data, leveraging “intelligent” mathematical algorithms at a furious pace. Much of this is done as part of the massively profitable endeavor of shaping consumer preferences and behaviors-to a degree unimagined by the best-and-brightest sci-fi […]
Blog.webp 2017-09-27 22:24:28 GUEST ESSAY: Why Trump\'s cybersecurity executive order is a step in the right direction (lien direct) By Alberto Yépez, managing director of Trident Capital Cybersecurity Last May, the White House issued a cybersecurity executive order (EO)-the Trump administration's first major action on cyber policy. It has attracted naysayers. The fact is, however, that the president has finally plugged a huge hole by putting in place a guiding strategy for our nation's cyber defense. And his […]
Blog.webp 2017-09-25 18:23:03 Equifax hack sheds light on ripe attack vector: open-source protocols used in business networks (lien direct) A major takeaway from the Equifax debacle that hasn't gotten enough attention is this: The massive data theft happened because of a vulnerability in an open-source component, which the credit bureau failed to lock down. Remember Heartbleed and Shellshock, the two massive security flaws discovered in open-source internet protocols back in 2014? The waves of network […] Equifax
Blog.webp 2017-09-22 17:56:58 PODCAST: Cyphort helps companies translate an ocean of network logs into actionable intelligence (lien direct) By Byron V. Acohido More companies are deploying cyber defenses to alert employees when possible threats to data and networks are detected. That's a good thing. What's not so good is that these tools and components can raise alarms so often, a company's tech team is in a constant state of high alert. I had […] APT 32
Blog.webp 2017-09-21 17:39:05 PODCAST: How Darklight marshals threat feeds, delivers useful intel to enterprises and MSSPs (lien direct) By Byron V. Acohido The ongoing warfare between small and midsize companies defending their networks against relentless hackers just isn't a fair fight, says John Shearer, CEO of DarkLight. All too many SMBs are clueless and/or lack resources dedicated to continually defending their networks against determined, innovative intruders. Meanwhile, the attackers are “extremely organized, and they're sharing their […]
Blog.webp 2017-09-20 17:52:49 INFOGRAPHIC: Studies show \'security fatigue\' may trigger apathy in wake of Equifax hack (lien direct) By Byron V. Acohido There is no mistaking that, by now, most consumers have at least a passing awareness of cyber threats. Two other things also are true: All too many people fail to take simple steps to stay safer online; and individuals who become a victim of identity theft, in whatever form, tend to […] Equifax
Blog.webp 2017-09-15 16:15:15 NEWS THIS WEEK: Kaspersky ban underway for U.S. agencies; Equifax data breach lawsuits pile up; Europe plans new agency to quell cyber threats (lien direct) By Byron V. Acohido The U.S. government moved to ban the use of a Russian brand of security software by federal agencies amid concerns the company has ties to state-sponsored cyber espionage activities. Acting Homeland Security Secretary Elaine Duke ordered that federal civilian agencies identify Kaspersky Lab software on their networks. After 90 days, unless otherwise directed, […] Equifax
Blog.webp 2017-09-15 16:09:38 PODCAST: How web browsers present an attack vector useful to criminal hackers - and business rivals (lien direct) By Byron V. Acohido Web browsers continue to represent, arguably, the most wide-open attack vector at any given company. This is because Mozilla Firefox, Google Chrome, Microsoft Explorer and Apple Safari all use a basic architecture ideally suited for a threat actor to manipulate. To put it bluntly, it's all too easy for an attacker to download […]
Blog.webp 2017-09-14 15:54:17 PODCAST: How a daily \'cyber hygiene\' routine can prevent a catastrophic network breach (lien direct) By Byron V. Acohido Cyber attacks don't discriminate between small and large businesses. Despite small business owners believing they are too small to be at risk, 43 percent of cyber attacks target small businesses. Yet, only one in four small businesses are prepared for such an attack, according to a recent report by Symantec. Related article: […]
Blog.webp 2017-09-11 13:54:40 ROUNDTABLE: Will massive Equifax breach be the wake up call for companies, regulators, consumers? (lien direct) By Byron V. Acohido The pain has only just begun for Equifax. Last Thursday, the giant credit bureau disclosed that hackers stole personal information for 143 million of its customers, presumably mostly Americans, but also Canadians and Europeans. In less than 24 hours, two Oregonians, Mary McHill and Brook Reinhard, filed a federal class-action lawsuit […] Equifax
Blog.webp 2017-09-08 22:08:07 NEWS THIS WEEK: Equifax admits losing data for 143 consumers; Symantec finds dozens of U.S. power plants compromised; Trump wants hacked email lawsuit thrown out (lien direct) By Byron V. Acohido Credit-reporting agency Equifax said hackers gained access to sensitive personal data-Social Security numbers, birth dates and home addresses-for up to 143 million Americans, a major cybersecurity breach at a firm that serves as one of the three major clearinghouses for credit histories. Equifax said the breach began in May and continued […] Equifax
Blog.webp 2017-09-08 16:24:01 PODCAST: Why \'machine identities\' represent a wide-open attack vector - and what your company should do about it (lien direct) By Byron V. Acohido Companies spend about $8 billion a year on identity and access management (IAM) systems, geared to keep track of humans, but spend practically nothing guarding machine identities. This is a problem because, according to consultancy firm Gartner, 50 percent of all network attacks in 2017 will use stolen or forged machine […]
Blog.webp 2017-09-07 19:04:03 PODCAST: Survey shows consumers fully aware of \'smart home\' security, privacy risks (lien direct) By Byron V. Acohido If you don't already have an Internet of Things (IoT) device in your home, chances are you will in the not too distant future. Following record growth in 2016, which saw 80 million smart devices delivered to homes across the world (an increase of 64 percent from the year before), analysts […]
Blog.webp 2017-09-06 15:09:40 VIDEO: Tempered Networks introduces \'identity-based networking\' (lien direct) By Byron V. Acohido Tempered Networks got its start by taking a unique approach toward locking down the industrial control systems (ICS) used at the Boeing Co.'s airplane manufacturing plants. The problem Boeing was trying to solve at the time turns out to be much the same as the puzzle organizations of all types face today: How […]
Blog.webp 2017-09-06 12:52:31 GUEST ESSAY: 5 cyber attacks you will need to defend this week (lien direct) By David Balaban, director of the Privacy-PC.com project Computer infections continue to pose a major threat to every one of us. Distinguishing between the most pervasive types of threats is the first step in protecting your particular device. Here is a quick rundown of what lurks out there: Mass mailed phishing campaigns. A mass mailing […]
Blog.webp 2017-09-02 16:27:48 NEWS THIS WEEK: Scammers target hurricane victims; pacemakers at risk of being hacked; Tillerson signals closure of cybersecurity office (lien direct) By Byron V. Acohido Scammers are using robocalls to try to fleece survivors of Hurricane Harvey. The robocalls tell people that their premiums are past due and that they must send money immediately or else have their flood insurance canceled. “That is pure fraud. You should only be taking information from trusted sources,” said Roy […]
Blog.webp 2017-09-01 17:39:38 ROUNDTABLE: The significance of the \'Onliner\' spambot leaking 711 million emails (lien direct) By Byron V. Acohido A spambot, referred to as Onliner, has been discovered delivering a malicious banking Trojan. What's worse, the spammers behind Onliner inadvertently exposed some 711 million email addresses held in their possession. Some context is needed to grasp the significance of this. Consider that spambots have been around for a long time. […]
Blog.webp 2017-09-01 16:49:55 PODCAST: Bringing enterprise-class security services to SMBs (lien direct) By Byron V. Acohido Cyber attacks on small and midsize businesses are on the rise. To compound the problem, SMBs are becoming the favorite target of cyber attackers thanks to their lack of security protection. The unpreparedness of small businesses makes for scary reading. According to SmallBizTrends: • 43 percent of cyber attacks target small […]
Blog.webp 2017-08-31 16:47:03 PODCAST: What senior executives need to understand about the global threat landscape (lien direct) By Byron V. Acohido While many organizations take cybersecurity seriously, there generally remains a great need for companies and agencies to think more deeply and comprehensively about network security. That's a top-line summary of a wide-ranging discussion I had at Black Hat 2017 in Las Vegas with Peter Alexander, chief marketing officer for Check Point […]
Blog.webp 2017-08-30 17:14:55 GUEST ESSAY: The case for CISOs to lead through influencing behaviors (lien direct) By M. Eric Johnson, Dean of Vanderbilt University’s Owen Graduate School of Management How do you lead when you're not in charge? Increasingly, managers are finding themselves in positions where they are asked to lead without having direct control. Growing and shifting organizations often mean fewer managers with positional power. Matrixed organizations put managers in […] Guideline
Blog.webp 2017-08-25 16:57:55 PODCAST: \'Web gateways\' provide vital slice of a layered approach to defending networks (lien direct) By Byron V. Acohido More employees are working remotely than ever before. According to a Gallup survey, 43 percent of the 15,000 surveyed Americans said they spent at least some time working remotely. That's up 4 percent since 2012. In a survey of business leaders at the Global Leadership Summit, 34 percent said over half […] Guideline
Blog.webp 2017-08-25 16:46:05 NEWS THIS WEEK: Identity theft hits record levels globally; Researchers find robots susceptible to hacks; Sen. McCain calls Trump\'s cybersecurity policy \'weak\' (lien direct) By Byron V. Acohido In the news this week, identity theft is reaching “epidemic levels,” says U.K. fraud prevention group Cifas, with people in their 30s the most targeted group. A total of 89,000 cases were recorded in the first six months of the year, a 5 percent increase over the same period last year […]
Last update at: 2024-04-29 13:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter