What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2022-08-29 16:27:31 GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers (lien direct) Web application attacks directed at organizations’ web and mail servers continue to take the lead in cybersecurity incidents. Related: Damage caused by ‘business logic’ hacking This is according to Verizon’s latest 2022 Data Breach Investigations Report (DBIR). In … (more…) Data Breach Guideline
Blog.webp 2022-06-27 11:54:56 GUEST ESSAY: The many benefits of infusing application security during software \'runtime\' (lien direct) Vulnerabilities in web applications are the leading cause of high-profile breaches. Related: Log4J's big lesson Log4j, a widely publicized zero day vulnerability, was first identified in late 2021, yet security teams are still racing to patch and protect their enterprise … (more…) Guideline
Blog.webp 2022-05-20 11:36:09 GUEST ESSAY: Here\'s why managed security services - MSS and MSSP - are catching on (lien direct) The unification revolution of cybersecurity solutions has started – and managed security service providers are leading the way. Managed security services (MSS) refer to a service model that enable the monitoring and managing of security technologies, systems, or even software-as-a-service … (more…) Guideline
Blog.webp 2022-01-17 11:47:24 GUEST ESSAY: The case for network defenders to focus on leading - not lagging - indicators (lien direct) A key CEO responsibility is reporting results that deliver on a company's mission to shareholders. This reporting often requires a host of metrics that define success, like Annual Recurring Revenue and sales for software as a service (SaaS) companies. These … (more…) Guideline
Blog.webp 2021-12-13 12:01:54 ROUNDTABLE: Cybersecurity experts reflect on 2021, foresee intensifying challenges in 2022 (lien direct) Privacy and cybersecurity challenges and controversies reverberated through all aspect of business, government and culture in the year coming to a close. Related: Thumbs up for Biden’s cybersecurity exec order Last Watchdog sought commentary from technology thought leaders about lessons … (more…) Guideline
Blog.webp 2021-12-06 11:14:32 GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication (lien direct) For IT leaders, passwords no longer cut it. They're expensive, difficult for employees to keep track of, and easy for hackers to utilize in cyberattacks. So why are they still around? Related: IT pros support passwordless access This traditional authentication … (more…) Guideline
Blog.webp 2021-04-19 11:37:02 MY TAKE: GraphQL APIs rev up innovation – but also introduce a potential security nightmare (lien direct) The software developers who are creating the coolest new mobile apps have a secret weapon. It's called GraphQL. Related: How APIs expand the attack surface GraphQL is a leading-edge approach to deploying APIs, the software conduits that mesh … (more…) Guideline
Blog.webp 2020-12-28 12:05:12 MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males (lien direct) How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided? It's tempting to place the lion's share of the blame on feckless political leaders and facile … (more…) Guideline
Blog.webp 2020-07-27 17:26:01 MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI (lien direct) It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.Related: Will ‘blockchain’ lead to more equitable wealth distribution?We may or may not … (more…) Guideline
Blog.webp 2020-05-13 11:27:43 MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks (lien direct) Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal valuesCISOs must preserve and protect their … (more…) Guideline
Blog.webp 2020-03-06 21:41:22 SHARED INTEL: Here\'s why CEOs who\'ve quit Tweeting are very smart to do so (lien direct) It's reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC's recent poll of 1,600 CEOs worldwide found that cyber attacks are … (more…) Guideline
Blog.webp 2019-09-27 14:58:19 MY TAKE: \'Perimeter-less\' computing requires cyber defenses to extend deeper, further forward (lien direct) Threat actors are opportunistic, well-funded, highly-motivated and endlessly clever. Therefore cybersecurity innovations must take hold both deeper inside and at the leading edges of modern business networks. Related: Lessons learned from Capitol One breach Most of the promising new technologies I've had the chance to preview this year validate this notion. The best and brightest […] Threat Guideline
Blog.webp 2018-11-28 08:55:03 MY TAKE: Michigan\'s Cyber Range hubs provide career paths to high-schoolers, underutilized adults (lien direct) Michigan is cultivating a collection of amazing cybersecurity training facilities, called Cyber Range hubs, that are shining models for what's possible when inspired program leaders are given access to leading-edge resources, wisely supplied by public agencies and private foundations. As a guest of the Michigan Economic Development Corporation, I recently had the chance to tour […] Guideline
Blog.webp 2018-08-21 10:55:00 What companies need to know about \'SecOps\' - the path to making \'digital transformation\' secure (lien direct) DevOps has been around for a while now, accelerating the creation of leading edge business applications by blending the development side with the operations side. It should come as no surprise that security is being formally added to DevOps, resulting in an emphasis on a process being referred to as SecOps or DevSecOps. Related: How […] Guideline
Blog.webp 2018-08-15 09:21:02 Q&A: Here\'s how Google\'s labeling HTTP websites “Not Secure” will strengthen the Internet (lien direct) In a move to blanket the Internet with encrypted website traffic, Google is moving forward with its insistence that straggling website publishers adopt HTTPS Secure Sockets Layer (SSL). Related: How PKI can secure IoT Google's Chrome web browser commands a 60% market share. So the search giant has been leading the push to get 100% […] Guideline
Blog.webp 2018-05-25 16:23:04 Preempt stakes out turf as supplier of \'Continuous Adaptive Risk and Trust Assessment\' technology (lien direct) Defending modern business networks continues to rise in complexity seemingly minute by minute. Perimeter defenses are woefully inadequate, and traditional tactics, like blacklisting and malware detection, are proving to be increasingly ineffective. Protecting business networks today requires a framework of defenses. Leading tech research firm Gartner has even contrived a new buzz phrase for the […] Guideline
Blog.webp 2018-05-03 15:53:03 (Déjà vu) PODCAST: Netsparker advances penetration testing 2.0 – automated web app vulnerability scanning (lien direct) A dozen years ago, or so, Ferruh Mavituna was doing very well as a lead penetration tester at a prominent cybersecurity consultancy when his frustration level began to spike. Mavituna had access to the best tools available to hunt down latent vulnerabilities in web applications. And yet, all too often for Mavituna's tastes, the tools […] Guideline
Blog.webp 2018-05-03 15:53:03 PODCAST: NetSparker advances penetration testing 2.0 – automated web app vulnerability scanning (lien direct) A dozen years ago, or so, Ferruh Mavituna was doing very well as a lead penetration tester at a prominent cybersecurity consultancy when his frustration level began to spike. Mavituna had access to the best tools available to hunt down latent vulnerabilities in web applications. And yet, all too often for Mavituna's tastes, the tools […] Guideline
Blog.webp 2018-03-29 00:15:03 MY TAKE: Why Google\'s move to label non-HTTPS sites \'not secure\' is a good thing (lien direct) San Francisco-based Cloudflare has traversed an interesting path to becoming a leading cybersecurity vendor. Back in 2004, Matthew Prince and Lee Holloway concocted something called Project Honey Pot to detect and deter email spammers. Prince's Harvard Business School classmate, Michelle Zatlyn, joined them in 2009, and together they elevated Project Honey Pot into a company […] Guideline
Blog.webp 2018-03-05 07:42:05 MY TAKE: Necurs vs. Mirai – what \'classic\' and \'IoT\' botnets reveal about evolving cyber threats (lien direct) I've written about how botnets arose as the engine of cybercrime, and then evolved into the Swiss Army Knife of cybercrime. It  dawned on me very recently that botnets have now become the bellwether of cybercrime. This epiphany came after checking in with top experts at Proofpoint, Forcepoint, Cloudflare and Corero — leading vendors that […] Guideline
Blog.webp 2017-10-14 15:54:10 PODCAST: Cyber forensic technology helps law enforcement keep terrorists in check (lien direct) By Byron V. Acohido For every horrific act of terrorism that gets carried out there are very likely dozens of plots that get thwarted by authorities using leading-edge cyber forensics tools to track malicious threat actors as that they communicate and transact across the Internet. Nuix is a Sydney, Australia-based company that supplies a well-established […] Guideline
Blog.webp 2017-08-30 17:14:55 GUEST ESSAY: The case for CISOs to lead through influencing behaviors (lien direct) By M. Eric Johnson, Dean of Vanderbilt University’s Owen Graduate School of Management How do you lead when you're not in charge? Increasingly, managers are finding themselves in positions where they are asked to lead without having direct control. Growing and shifting organizations often mean fewer managers with positional power. Matrixed organizations put managers in […] Guideline
Blog.webp 2017-08-25 16:57:55 PODCAST: \'Web gateways\' provide vital slice of a layered approach to defending networks (lien direct) By Byron V. Acohido More employees are working remotely than ever before. According to a Gallup survey, 43 percent of the 15,000 surveyed Americans said they spent at least some time working remotely. That's up 4 percent since 2012. In a survey of business leaders at the Global Leadership Summit, 34 percent said over half […] Guideline
Last update at: 2024-04-29 13:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter