What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2022-04-13 12:55:52 GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia\'s invasion of Ukraine (lien direct) Cyberattacks preceded Russia's invasion of Ukraine, and these attacks continue today as the war unfolds. As the United States and other nations condemn Russia's actions, the odds of Russian cyber actors targeting the U.S., allied countries, and businesses steadily increases.… (more…)
Blog.webp 2022-04-11 11:26:29 GUEST ESSAY: Defending ransomware boils down to this: make it very costly for cybercriminals (lien direct) From financial institutions to meat producers, it seems every industry has been impacted by ransomware in the past year — maybe even the past week. The world's largest enterprises to the smallest mom-and-pop shops have been devastated by cybercriminals who … (more…) Ransomware
Blog.webp 2022-04-07 12:13:45 GUEST ESSAY: Here\'s why \'purple team\' mock attacks trumps traditional \'red team\' assaults (lien direct) Purple teaming is a way to use red teaming to understand and improve your defensive posture. Militaries improve operations through wargames. In the 1820s, the Prussian military labeled the two teams for this as “red” and “blue,” with red traditionally … (more…)
Blog.webp 2022-04-05 11:59:04 GUEST ESSAY: NewsCorp hack shows cyber espionage, squelching of press freedom on the rise (lien direct) As the dust settles following the recently disclosed hack of NewsCorp, important lessons are emerging for the cybersecurity and journalism communities. Related: How China challenged Google in Operation Aurora The Chinese government is well known for its censorship– and … (more…) Hack
Blog.webp 2022-04-04 12:30:20 GUEST ESSAY : Advanced tech to defend API hacking is now readily available to SMBs (lien direct) APIs have become a security nightmare for SMBs and enterprises alike. Hackers don’t discriminate based on the number of employees or the size of the IT budget. The same types of security risks impact businesses, whatever their size. Related: Using (more…)
Blog.webp 2022-03-31 11:58:57 GUEST ESSAY: The case for leveraging hardware to shore up security - via a co-processor (lien direct) Cybersecurity has never felt more porous. You are no doubt aware of the grim statistics: •The average cost of a data breach rose year-over-year from $3.86 million to $4.24 million in 2021, according to IBM. •The majority of cyberattacks … (more…) Data Breach
Blog.webp 2022-03-29 17:49:32 MY TAKE: Log4j\'s big lesson – legacy tools, new tech are both needed to secure modern networks (lien direct) Log4j is the latest, greatest vulnerability to demonstrate just how tenuous the security of modern networks has become. Log4j, aka Log4Shell, blasted a surgical light on the multiplying tiers of attack vectors arising from enterprises' deepening reliance on open-source software.… (more…) Vulnerability
Blog.webp 2022-03-28 12:29:36 GUEST ESSAY: Embracing \'Zero Trust\' can help cloud-native organizations operate securely (lien direct) Some 96 percent of organizations — according to the recently released 2021 Cloud Native Survey — are either using or evaluating Kubernetes in their production environment, demonstrating that enthusiasm for cloud native technologies has, in the words of the report's … (more…) Uber
Blog.webp 2022-03-24 11:37:32 SHARED INTEL: A foolproof consumer\'s guide to creating and managing bulletproof passwords (lien direct) It can be a real hassle to keep track of the passwords you use. So many people use the same combination of username and password for every account. However, this isn't a good idea. In fact, it's terrible. Related: Kaseya (more…)
Blog.webp 2022-03-21 17:21:53 GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data (lien direct) It's an irony often noted about wealth: The more money you have, the more you have to worry about money – managing it, protecting it, nurturing it for further growth. Related: Using employees as human sensors For businesses, the same … (more…)
Blog.webp 2022-03-17 11:55:09 GUEST ESSAY: Marshaling automated cybersecurity tools to defend automated attacks (lien direct) Cybersecurity tools evolve towards leveraging machine learning (ML) and artificial intelligence (AI) at ever deeper levels, and that's of course a good thing. However, we often see results that feel cookie cutter and counter-productive, raising the question: can AI really … (more…)
Blog.webp 2022-03-14 19:57:09 GUEST ESSAY: Few consumers read privacy policies - tools can now do this for them (lien direct) When was the last time you read an online privacy policy in its entirety? Perhaps, never? Yet our world has moved online. We have on average 67 applications on our mobile phones, seven social media accounts and more than 120 … (more…)
Blog.webp 2022-03-10 13:15:38 GUEST ESSAY: Improved \'data governance\' can help companies meet today\'s security challenges (lien direct) There has been a rapid rise in the number of cyber-attacks in recent years affecting organizations in sectors as diverse as eCommerce, retail, infrastructure, and social media. Related: Biden issues much needed cybersecurity exec order Despite the tremendous amount of … (more…)
Blog.webp 2022-03-07 12:10:20 GUEST ESSAY: Why rigorous vulnerability management is crucial to protecting critical systems (lien direct) As companies accelerate their reliance on agile software development, cloud-hosted IT infrastructure and mobile applications, vulnerability management (VM) has an increasingly vital security role to play. Related: Log4j vulnerability translates into vast exposures Not only does VM contribute to the … (more…) Vulnerability
Blog.webp 2022-03-03 11:46:57 GUEST ESSAY: The case for acknowledging - and bridging - the security gap between IT vs OT (lien direct) My many years working with companies dealing with significant disruptions in the cybersecurity space has taught me a lot. The more I learn, the more I understand the inherent vulnerabilities facing organizations across the world. Related: Biden cybersecurity order makes (more…)
Blog.webp 2022-03-01 07:03:06 GUEST ESSAY – A primer on \'WAAP\' – an approach to securing APIs at the web app layer (lien direct) One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. Related: How a dynamic WAF can help protect SMBs APIs interconnect the underlying components of modern digital services in a very … (more…)
Blog.webp 2022-02-24 11:08:00 GUEST ESSAY: Here\'s why penetration testing has become a \'must-have\' security practice (lien direct) A reported loss of $171 Million. Huge sum, right? Related: Supply-chain hacks prove worrisome Yes, and that is what Sony exactly lost when they were hacked and the personal info of every one of its customers leaked in 2011. This … (more…)
Blog.webp 2022-02-21 18:53:28 GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks (lien direct) The headlines are disturbing: Breach of patient records; Surgeries and appointments cancelled due to IT outage; and even, Death attributed to ransomware attack on hospital. Related: High-profile healthcare hacks in 2021 The risks are real, and the … (more…) Ransomware
Blog.webp 2022-02-17 11:30:06 GUEST ESSAY – Here\'s how web-scraping proxies preserve anonymity while aiding data access (lien direct) Data helps digital businesses make meaningful decisions and fast-track their growth in a global market so that companies that are skilled at harvesting data regularly and consistently tend to grow faster than those that only involve data scantily in making … (more…)
Blog.webp 2022-02-14 07:10:32 GUEST ESSAY: 5 steps all SMBs should take to minimize IAM exposures in the current enviroment (lien direct) Which topics should CEOs, CIOs and CISOs have on their radar when it comes to Identity and Access Management (IAM) and cyber security risks in 2022? Related: How IAM authenticates users Here are a few important issues that … (more…)
Blog.webp 2022-02-08 14:05:00 GUEST ESSAY: Can Apple\'s pricey \'Business Essentials\' truly help SMBs secure their endpoints? (lien direct) Today's operating system battleground has long been defined by the warfare between the top three players-Microsoft’s Windows, Google’s Android, and Apple’s iOS. Related: Cook vs. Zuckerberg on privacy While each of them has its distinguishing features, Apple’s privacy and (more…)
Blog.webp 2022-02-07 11:17:17 GUEST ESSAY: Successful tactics threat actors leverage to probe, compromise vulnerable networks (lien direct) When new vulnerabilities re announced or flaws are discovered in public or “off the shelf” applications, several things happen. News spreads of the risks while attackers and security professionals alike begin searching for potential attack targets for the purpose of … (more…) Threat
Blog.webp 2022-02-03 12:37:10 GUEST ESSAY: The case for shifting to \'personal authentication\' as the future of identity (lien direct) I currently have over 450 accounts that use passwords combined with a variety of two-factor authentication methods. Related: How the Fido Alliance enables password-less authentication I don’t know every password; indeed, each password is long, complex and unique. In effect, … (more…)
Blog.webp 2022-01-31 11:25:35 GUEST ESSAY: Understanding the security limits of the static and dynamic passwords we rely on (lien direct) We all rely on passwords. For better or worse, we will continue to use passwords to access our computing devices and digital services for years to come. Related: The coming of password-less access Passwords were static to begin with. … (more…)
Blog.webp 2022-01-27 11:23:10 GUEST ESSAY: Addressing data leaks and other privacy, security exposures attendant to M&As (lien direct) Merger and acquisition (M&A) activity hit record highs in 2021, and isn't expected to slow down anytime soon. Related: Stolen data used to target mobile services Many attribute this steady growth to the increase in work-from-home models and adoption of … (more…)
Blog.webp 2022-01-24 15:25:30 GUEST ESSAY: A primer on why AI could be your company\'s cybersecurity secret weapon in 2022 (lien direct) Artificial intelligence (AI) is woven into the fabric of today's business world. However, business model integration of AI is in its infancy and smaller companies often lack the resources to leverage AI. Related: Deploying human security sensors Even so, AI … (more…)
Blog.webp 2022-01-20 12:33:44 GUEST ESSAY: Here\'s why EDR and XDR systems failed to curtail the ransomware wave of 2021 (lien direct) Looking back, 2021 was a breakout year for ransomware around the globe, with ransoms spiking to unprecedented multi-million dollar amounts. Related: Colonial Pipeline attack ups ransomware ante All this while Endpoint Detection and Response system (EDR) installations are at an … (more…) Ransomware
Blog.webp 2022-01-18 08:17:53 GUEST ESSAY: Data breaches across the globe slowed significantly in Q4 2021 versus Q1-Q3 (lien direct) After a gloomy start with its first three breach intensive quarters, 2021 has finally ended, and on a positive note. Related: Cybersecurity experts reflect on 2021 This conclusion is derived from an analysis of data taken from our data breach … (more…) Data Breach
Blog.webp 2022-01-17 11:47:24 GUEST ESSAY: The case for network defenders to focus on leading - not lagging - indicators (lien direct) A key CEO responsibility is reporting results that deliver on a company's mission to shareholders. This reporting often requires a host of metrics that define success, like Annual Recurring Revenue and sales for software as a service (SaaS) companies. These … (more…) Guideline
Blog.webp 2022-01-13 11:25:31 GUEST ESSAY: JPMorgan\'s $200 million in fines stems from all-too-common compliance failures (lien direct) Last month's $125 million Security and Exchange Commission (SEC) fine combined with the $75 million U.S. Commodity Futures Trading Commission (CFTC) fine against JPMorgan sent shockwaves through financial and other regulated customer-facing industries. Related: Why third-party risks are on the (more…)
Blog.webp 2022-01-11 11:45:29 MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing? (lien direct) Might it be possible to direct cool digital services at holistically improving the wellbeing of each citizen of planet Earth? Related: Pursuing a biological digital twin A movement aspiring to do just that is underway — and it's not being … (more…)
Blog.webp 2022-01-10 12:07:56 GUEST ESSAY: 5 tips for \'de-risking\' work scenarios that require accessing personal data (lien direct) Working with personal data in today's cyber threat landscape is inherently risky. Related: The dangers of normalizing encryption for government use It's possible to de-risk work scenarios involving personal data by carrying out a classic risk assessment of an organization's … (more…) Threat
Blog.webp 2022-01-06 12:13:51 GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access (lien direct) Cyber threats continue to gain momentum and there are still not enough ways to counter it. Related: Why the ‘Golden Age’ of cyber espionage is upon us. The global threat intelligence market size was estimated at $10.9 billion in 2020(more…) Threat
Blog.webp 2022-01-04 17:57:06 MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously (lien direct) APIs are putting business networks at an acute, unprecedented level of risk – a dynamic that has yet to be fully acknowledged by businesses. Related: ‘SASE’ framework extends security to the network edge That said, APIs are certain to get … (more…)
Blog.webp 2021-12-30 12:11:04 GUEST ESSAY: Here\'s how \'WFM\' tools can boost productivity - and security - of remote workers (lien direct) Workforce management software (WFM) is an essential tool companies across industries can  use to organize their workforce, track employee work and performance, forecast labor demand, and create schedules for employees. Related: Turning workers into security security sensors Most, … (more…) Tool
Blog.webp 2021-12-27 12:13:06 ROUNDTABLE: What happened in privacy and cybersecurity in 2021 - and what\'s coming in 2022 (lien direct) In 2021, we endured the fallout of a seemingly endless parade of privacy controversies and milestone cyber attacks. Related: The dire need to security-proof APIs The Solar Winds hack demonstrated supply chain exposures; the attempted poisoning of a Tampa suburb's … (more…)
Blog.webp 2021-12-21 15:42:38 GUEST ESSAY: Why Microsoft Exchange users \'must have\' robust data recovery policies, practices (lien direct) Cloud hosted email services have come into wide use as the go-to communication and collaboration work tools for businesses far and wide. Related: Weaponized email endures as top threat Digital native companies start from day one relying entirely on Microsoft … (more…)
Blog.webp 2021-12-20 11:43:18 GUEST ESSAY: Introducing \'killware\' - malware designed to contaminate, disrupt critical services (lien direct) Within the past year, we have seen a glut of ransomware attacks that made global news as they stymied the operations of many. In May, the infamous Colonial Pipeline ransomware attack disrupted nationwide fuel supply to most of the U.S. … (more…) Ransomware Malware ★★★★★
Blog.webp 2021-12-16 11:22:33 GUEST ESSAY: Why the arrests of cyber criminals in 2021 will incentize attackers in 2022 (lien direct) In 2021, law enforcement continued making a tremendous effort to track down, capture and arrest ransomware operators, to take down ransomware infrastructure, and to claw back ransomware payments. Related: The targeting of supply chains While some of these efforts have … (more…) Ransomware
Blog.webp 2021-12-14 11:40:41 SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022 (lien direct) As we close out 2021, a gargantuan open-source vulnerability has reared its ugly head. Related: The case for ‘SBOM’ This flaw in the Apache Log4J logging library is already being aggressively probed and exploited by threat actors — and it … (more…) Vulnerability Threat
Blog.webp 2021-12-13 12:01:54 ROUNDTABLE: Cybersecurity experts reflect on 2021, foresee intensifying challenges in 2022 (lien direct) Privacy and cybersecurity challenges and controversies reverberated through all aspect of business, government and culture in the year coming to a close. Related: Thumbs up for Biden’s cybersecurity exec order Last Watchdog sought commentary from technology thought leaders about lessons … (more…) Guideline
Blog.webp 2021-12-09 11:57:35 GUEST ESSAY: Lessons learned in 2021 as cloud services, mobility and cybersecurity collided (lien direct) In 2021 we witnessed the continuation of the seismic shift in how people work, a change that started at the beginning of the global pandemic. The acceleration of cloud, mobility, and security initiatives proved to be critical for organizations looking … (more…)
Blog.webp 2021-12-07 19:26:15 NEW TECH: How a \'bio digital twin\' that helps stop fatal heart attacks could revolutionize medicine (lien direct) Without much fanfare, digital twins have established themselves as key cogs of modern technology. Related: Leveraging the full potential of data lakes. A digital twin is a virtual duplicate of a physical entity or a process — created by extrapolating … (more…)
Blog.webp 2021-12-06 11:14:32 GUEST ESSAY: How the FIDO Alliance helps drive the move to passwordless authentication (lien direct) For IT leaders, passwords no longer cut it. They're expensive, difficult for employees to keep track of, and easy for hackers to utilize in cyberattacks. So why are they still around? Related: IT pros support passwordless access This traditional authentication … (more…) Guideline
Blog.webp 2021-12-02 11:48:46 GUEST ESSAY: Ransomware pivot 2021: attackers now grab, threaten to leak sensitive data (lien direct) Ransomware attacks have reached a record high this year, with nearly 250 attacks recorded to date and months to go. As we've seen with major attacks like Kaseya and Colonial Pipeline, cybercriminals have continued to innovate, developing new tools … (more…) Ransomware
Blog.webp 2021-11-30 11:51:30 SHARING INTEL: Here\'s why it has become so vital to prioritize the security-proofing of APIs (lien direct) Application Programming Interface. APIs. Where would we be without them? Related: Supply-chain exposures on the rise APIs are the snippets of code that interconnect the underlying components of all the digital services we can't seem to live without. Indeed, APIs … (more…)
Blog.webp 2021-11-29 11:32:55 GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures (lien direct) Mental health at work is undergoing a rapid transformation. Even before the COVID-19 pandemic, which has caused an increase in feelings of loneliness and isolation, workers' mental health was under pressure. Related: Capital One hacker demonstrated ‘erratic behavior’ According to … (more…)
Blog.webp 2021-11-22 11:09:58 GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene (lien direct) More Americans than ever are working remotely and seeking out entertainment online, and this increase of internet activity has fueled a dramatic spike in cybercrime. With so much critical data now stored in the cloud, how can people protect … (more…)
Blog.webp 2021-11-15 11:59:22 GUEST ESSAY: The three horsemen of cyber risks: misinformation, disinformation and fake news (lien direct) Industry 4.0 has brought about a metamorphosis in the world of business. The new revolution demands the integration of physical, biological and digital systems under one roof. Related: Fake news leveraged in presidential election Such a transformation however, comes with … (more…)
Blog.webp 2021-11-08 12:33:47 GUEST ESSAY: Securely managing access controls is vital to preserving the privacy of healthcare data (lien direct) There's no doubt, the increasing use of telemedicine, the explosion of health-based cloud apps, and innovative medical IoT devices are improving the patient care experience. Related: Hackers relentlessly target healthcare providers However, healthcare data ranks at the top of the … (more…)
Last update at: 2024-03-29 09:09:49
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter