What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2021-11-04 11:50:24 GUEST ESSAY: How stricter data privacy laws have redefined the \'filing\' of our personal data (lien direct) Filing systems, historically speaking, have been all about helping its users find information quickly.  Related: GDPR and the new privacy paradigm Europe's General Data Protection Regulations (GDPR) changed the game. Generally, filing systems sort by date, department, topic, etc. Legacy … (more…)
Blog.webp 2021-11-03 11:07:44 MY TAKE: lastwatchdog.com receives recognition as a Top 10 cybersecurity webzine in 2021 (lien direct) Last Watchdog's mission is to foster useful understanding about emerging cybersecurity and privacy exposures. Related article: The road to a Pulitzer While I no longer concern myself with seeking professional recognition for doing this, it's, of course, always terrific to … (more…)
Blog.webp 2021-11-02 17:37:09 MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall (lien direct) Managing permissions is proving to be a huge security blind spot for many companies. Related: President Biden’s cybersecurity order sets the stage What's happening is that businesses are scaling up their adoption of multi-cloud and hybrid-cloud infrastructures. And in … (more…)
Blog.webp 2021-11-01 11:36:16 GUEST ESSAY: Here\'s what every business should know - and do - about CaaS: crime-as-a-service (lien direct) It doesn’t matter if you want to learn a new language or figure out how to fix your broken clothes dryer; the tools, tutorials, and templates you need are available online. Related: Enlisting ‘human sensors’ Unfortunately, with crime-as-a-service, the same … (more…)
Blog.webp 2021-10-28 12:01:43 GUEST ESSAY: Tapping Bitcoin\'s security - to put a stop to \'51% attacks\' of cryptocurrency exchanges (lien direct) Over the past five years, cryptocurrency exchanges have been the target of increasingly damaging “51% attacks” resulting in the theft of over $30 million worth of cryptocurrency to date. Related: Wildland restores control of data to individuals However, … (more…)
Blog.webp 2021-10-26 11:50:08 SHARED INTEL: Automating PKI certificate management alleviates outages caused by boom (lien direct) Our Public Key Infrastructure is booming but also under a strain that manual certificate management workflows are not keeping up with. Related: A primer on advanced digital signatures PKI and digital certificates were pivotal in the formation of the commercial … (more…)
Blog.webp 2021-10-25 17:24:38 GUEST ESSAY: Here\'s why castle-wall defenses utterly fail at stopping deceptive adversaries (lien direct) When it comes to cyber attacks, most businesses think: “It could never happen to us,” but some plots are just hitting a little too close to home. Related: T-Mobile breach reflects rising mobile device attacks For instance, if you've ever … (more…)
Blog.webp 2021-10-21 12:03:20 GUEST ESSAY: Silence on the front lines of strategic cyber assaults belies heightening tensions (lien direct) First released in the late 1920s, the novel “All Quiet on the Western Front” was publicly burned, banned, derided and censored for its “anti-war” and “unpatriotic” messages. Set in the final weeks of World War 1, the story swings heavily … (more…)
Blog.webp 2021-10-19 11:41:47 MY TAKE: Can Project Wildland\'s egalitarian platform make Google, Facebook obsolete? (lien direct) Most of the people I know professionally and personally don't spend a lot of time contemplating the true price we pay for the amazing digital services we've all become addicted to. Related: Blockchain’s role in the next industrial revolution I'll … (more…)
Blog.webp 2021-10-18 10:36:15 GUEST ESSAY: What everyone can - and should - do to mark Cybersecurity Awareness Month (lien direct) With new technological advancements comes a need for heightened security measures. Plenty of criminals are searching for vulnerabilities in networks, so it shouldn't come as a surprise that cybersecurity issues have become more prevalent. Related: President Biden issues cybersecurity executive (more…)
Blog.webp 2021-10-13 11:51:18 GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints (lien direct) In recent years, brands have started butting up against the line between convenience and privacy.  Shoppers love the convenience of personalized experiences that their data powers, but then horror stories such as the Cambridge Analytica scandal make people skeptical about … (more…)
Blog.webp 2021-10-11 12:11:15 GUEST ESSAY: How SPDX helps reconcile interdependencies of open, proprietary software (lien direct) Software today is built on a combination of open source and proprietary software packages.  Developers can reuse and build on the packages created by others, which results in the rapid creation of new capabilities and technologies. Related: How SBOM factors (more…)
Blog.webp 2021-10-04 11:23:25 GUEST ESSAY: What it will take to train the next generation of cybersecurity analysts (lien direct) It is no secret that there is, and has been for some time, a shortage of trained cyber security professionals in corporate IT Security teams.  The Wharton School of the University of Pennsylvania observed that “nowhere is the workforce-skills gap … (more…)
Blog.webp 2021-09-30 11:45:23 GUEST ESSAY: A breakdown of Google\'s revisions to streamline its \'reCAPTCHA\' bot filter (lien direct) Most of us internet users are obviously familiar with CAPTCHAs: a challenge or test that is designed to filter out bots (automated programs) and only allow legitimate human users in. Related: How bots fuel ‘business logic’ hacking The basic principle … (more…)
Blog.webp 2021-09-27 11:38:47 GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment (lien direct) Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks - there's no denying that. Related: How Russia uses mobile apps to (more…)
Blog.webp 2021-09-20 16:50:50 SHARED INTEL: How \'observability\' has enabled deep monitoring of complex modern networks (lien direct) An array of promising security trends is in motion. New frameworks, like SASE, CWPP and CSPM, seek to weave security more robustly into the highly dynamic, intensely complex architecture of modern business networks. Related: 5 Top SIEM myths(more…)
Blog.webp 2021-09-13 11:55:53 MY TAKE: Surfshark boosts \'DIY security\' with its rollout of VPN-supplied antivirus protection (lien direct) Surfshark wants to help individual citizens take very direct control of their online privacy and security. Thus, Surfshark has just become the first VPN provider to launch an antivirus solution as part of its all-in-one security bundle Surfshark One.… (more…)
Blog.webp 2021-09-08 12:19:29 GUEST ESSAY: Why it\'s worrisome that China has integrated Huawei switches into telecoms worldwide (lien direct) In the previous discussion, China's 14th Five-Year Plan was summarized to capture relevant aspects of dual circulation, the Digital Silk Road (DSR), and the Belt Road Initiative (BRI) that aim to advance China as an economic, technological, and foreign policy … (more…)
Blog.webp 2021-09-07 12:05:38 GUEST POST: How China\'s updated digital plans impacts U.S. security and diplomacy (lien direct) In May 2021, China unveiled their updated Five-Year Plan to the world. This plan marks the 14th edition of their socioeconomic, political, and long-range objectives, and has set the tone for a Chinese-dominated supply chain that will be accomplished using … (more…)
Blog.webp 2021-08-30 12:19:11 GUEST ESSAY: The Top 5 myths about SIEM –\'security information and event management\' (lien direct) One of the most commonly repeated phrases in the security industry is, “Security teams hate their SIEM!” Related: The unfolding SIEM renaissance Security Information and Event Management (SIEM) is not what it was 20 years ago. Don't get me wrong, … (more…)
Blog.webp 2021-08-23 14:24:12 GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces (lien direct) While every business needs to prioritize cybersecurity, doing so is becoming increasingly complicated. With many employees now working remotely, securing company data isn't as straightforward as it used to be. Things get even more complicated if you have an international … (more…)
Blog.webp 2021-08-19 11:53:19 ROUNDTABLE: Why T-Mobile\'s latest huge data breach could fuel attacks directed at mobile devices (lien direct) TMobile has now issued a formal apology and offered free identity theft recovery services to nearly 48 million customers for whom the telecom giant failed to protect their sensitive personal information. At the start of this week, word got out … (more…) Data Breach
Blog.webp 2021-08-18 11:36:23 MY TAKE: What NortonLifeLock\'s $8 billion buyout of Avast portends for consumer security (lien direct) So NortonLifeLock has acquired Avast for more than $8 billion. This deal reads like to the epilogue to a book titled The First 20 Years of the Supremely Lucrative Antivirus Market. Way back in 1990, Symantec acquired Norton Utilities(more…)
Blog.webp 2021-08-16 15:17:32 Author Q&A: In modern cyberwarfare \'information security\' is one in the same with \'national security\' (lien direct) What exactly constitutes cyberwarfare? The answer is not easy to pin down. On one hand, one could argue that cyber criminals are waging an increasingly debilitating economic war on consumers and businesses in the form of account hijacking, fraud, and … (more…)
Blog.webp 2021-08-05 13:43:27 Black Hat insights: How to shift security-by-design to the right, instead of left, with SBOM, deep audits (lien direct) There is a well-established business practice referred to as bill of materials, or BOM, that is a big reason why we can trust that a can of soup isn't toxic or that the jetliner we're about to board won't fail … (more…)
Blog.webp 2021-08-04 12:22:12 Black Hat insights: Deploying \'human sensors\' to reinforce phishing email detection and response (lien direct) Human beings remain the prime target in the vast majority of malicious attempts to breach company networks. Related: Stealth tactics leveraged to weaponize email Cybersecurity awareness training is valuable and has its place. Yet as Black Hat USA 2021 returns … (more…)
Blog.webp 2021-08-04 07:05:55 Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs (lien direct) A cornucopia of cybersecurity solutions went on public display today as Black Hat USA 2021 convened once more as a live event in Las Vegas. Related: Kaseya hack raises more supply chain worries For small- and mid-sized businesses (SMBs) cutting … (more…) Hack
Blog.webp 2021-08-03 11:42:58 Black Hat insights: All-powerful developers begin steering to the promise land of automated security (lien direct) Software developers have become the masters of the digital universe. Related: GraphQL APIs pose new risks Companies in the throes of digital transformation are in hot pursuit of agile software and this has elevated developers to the top of the … (more…)
Blog.webp 2021-08-02 11:37:53 Black Hat insights: The retooling of SOAR to fit as the automation core protecting evolving networks (lien direct) In less than a decade, SOAR — security orchestration, automation and response — has rapidly matured into an engrained component of the security technology stack in many enterprises. Related: Equipping SOCs for the long haul SOAR has done much since … (more…)
Blog.webp 2021-07-30 11:24:04 Black Hat insights: Will Axis Security\'s ZTNA solution hasten the sunsetting of VPNs, RDP? (lien direct) Company-supplied virtual private networks (VPNs) leave much to be desired, from a security standpoint. Related: How ‘SASE’ is disrupting cloud security This has long been the case. Then a global pandemic came along and laid bare just how brittle company … (more…)
Blog.webp 2021-07-29 11:52:26 Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures (lien direct) Modern civilization revolves around inextricably intertwined relationships. This is why our financial markets rise and fall in lock step; why climate change is accelerating; and why a novel virus can so swiftly and pervasively encircle the planet. Related: What it (more…)
Blog.webp 2021-07-27 11:47:10 SHARED INTEL: Ramifications of 86 cities storing citizens\' data in misconfigured AWS S3 buckets (lien direct) The ethical hackers at WizCase recently disclosed another stunning example of sensitive consumer data left out in the open in the public cloud —  for one and all to access. Related: How stolen data gets leveraged in full-stack attacks This … (more…)
Blog.webp 2021-07-26 11:46:01 NEW TECH: How the emailing of verified company logos actually stands to fortify cybersecurity (lien direct) Google's addition to Gmail of something called Verified Mark Certificates (VMCs) is a very big deal in the arcane world of online marketing. Related: Dangers of weaponized email This happened rather quietly as Google announced the official launch of VMCs(more…)
Blog.webp 2021-07-21 11:50:26 NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures (lien direct) Most of us, by now, take electronic signatures for granted. Related: Why PKI will endure as the Internet’s secure core Popular services, like DocuSign and Adobe Sign, have established themselves as convenient, familiar tools to conduct daily commerce, exclusively online. … (more…)
Blog.webp 2021-07-16 12:03:26 GUEST ESSAY: Who do you think impacts privacy, free markets more: Big Government or Big Tech? (lien direct) Proposed bipartisan legislation to modernize U.S. antitrust law and enforcement standards for the 21st century digital marketplace calls for a fact-driven comparison of Big-Tech's unchecked power relative to Big Government's Constitutionally limited power. Related: Apple vs. Facebook privacy war… (more…)
Blog.webp 2021-07-08 11:20:37 ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures (lien direct) It was bound to happen: a supply-chain compromise, ala SolarWinds, has been combined with a ransomware assault, akin to Colonial Pipeline, with devasting implications. Related: The targeting of supply chains Last Friday, July 2, in a matter of a few … (more…) Ransomware Hack
Blog.webp 2021-07-07 11:55:12 SHARED INTEL: \'Credential stuffers\' leverage enduring flaws to prey on video game industry (lien direct) The video game industry saw massive growth in 2020; nothing like a global pandemic to drive  people to spend more time than ever gaming. Related: Credential stuffers exploit Covid 19 pandemic Now comes a report from Akamai detailing the extent … (more…)
Blog.webp 2021-06-30 11:40:04 GUEST ESSAY: Why online supply chains remain at risk - and what companies can do about it (lien direct) The Solarwinds hack has brought vendor supply chain attacks — and the lack of readiness from enterprises to tackle such attacks — to the forefront. Related: Equipping Security Operations Centers (SOCs) for the long haul Enterprises have long operated in … (more…) Hack
Blog.webp 2021-06-28 18:10:20 SHARED INTEL: Microsoft discloses how the Nobelium hacking ring engages in routine phishing (lien direct) Microsoft has blunted the ongoing activities of the Nobelium hacking collective, giving us yet another glimpse of the unceasing barrage of hack attempts business networks must withstand on a daily basis. Related: Reaction to Biden ‘s cybersecurity executive order Nobelium … (more…) Malware Hack Threat ★★★★★
Blog.webp 2021-06-23 11:59:13 MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts (lien direct) The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Related: How ‘PAM’ improves authentication SMBs today face a daunting balancing act. To boost productivity, they must leverage … (more…)
Blog.webp 2021-06-22 11:54:51 MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses (lien direct) Network security is in the throes of a metamorphosis. Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. Related: Automating security-by-design in SecOps This means Security … (more…)
Blog.webp 2021-06-09 11:34:12 MY TAKE: Massive data breaches persist as agile software development fosters full-stack hacks (lien direct) Data leaks and data theft are part and parcel of digital commerce, even more so in the era of agile software development. Related: GraphQL APIs stir new exposures Many of the high-profile breaches making headlines today are the by-product of … (more…)
Blog.webp 2021-06-07 12:01:29 GUEST ESSAY: Data poverty is driving the growth of cybercrime – here\'s how to reverse the trend (lien direct) Data poverty is real and it's coming for your user accounts. Related: Credential stuffing soars due to Covid-19 The current state of data in cybersecurity is a tale of The Haves and The Have-WAY-mores. All tech companies have data, of … (more…)
Blog.webp 2021-06-02 12:15:30 MY TAKE: Why monetizing data lakes will require applying \'attribute-based\' access rules to encryption (lien direct) The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. Related:  The importance of basic research We've barely scratched the surface of applying artificial intelligence and advanced data analytics … (more…)
Blog.webp 2021-06-01 12:08:16 GUEST ESSAY: A full checklist on how to spot pharming attacks - and avoid becoming a victim (lien direct) Cybercriminals use various techniques for conducting cyberattacks. One such popular way to infiltrate a system is Pharming. It is an online scam attack quite similar to Phishing. Related: Credential stuffing explained The term Pharming is a combination of two words … (more…)
Blog.webp 2021-05-28 17:02:41 ROUNDTABLE: Experts react to DHS assigning TSA to keep track of cyber attacks on pipelines (lien direct) The same federal agency that makes you take your shoes off and examines your belongings before boarding a flight will begin monitoring cyber incidents at pipeline companies. Related: DHS begins 60-day cybersecurity sprints The Department of Homeland Security on Thursday … (more…)
Blog.webp 2021-05-26 11:32:04 GUEST ESSAY: \'World password day\' reminds us to embrace password security best practices (lien direct) We celebrated World Password Day on May 6, 2021. Related: Credential stuffing fuels account takeovers Did you know that this unconventional celebration got its start in 2013, and that it's now an official holiday on the annual calendar? Every year, … (more…)
Blog.webp 2021-05-25 16:15:34 Last Watchdog podcast: Unwrapping \'resilience\' guidance discussed at RSA Conference 2021 (lien direct) Resilience was the theme of RSA Conference 2021 which took place virtually last week. Related: Web attacks spike 62 percent in 2020 I've been covering this cybersecurity gathering since 2004 and each year cybersecurity materially advances. By the same token, … (more…)
Blog.webp 2021-05-24 11:44:05 SHARED INTEL: Akamai reports web attack traffic spiked 62 percent in 2020 - all sectors hit hard (lien direct) Some instructive fresh intelligence about how cyber attacks continue to saturate the Internet comes to us from Akamai Technologies. Related: DHS launches 60-day cybersecurity sprints Akamai, which happens to be the Hawaiian word for “smart,” recently released its annual State (more…)
Blog.webp 2021-05-20 11:59:00 MY TAKE: How SASE has begun disrupting IT - by shifting cybersecurity to the \'services edge\' (lien direct) One of the hottest topics at RSA Conference 2021 taking place virtually this week is the Secure Access Services Edge (SASE) security framework. Related: Cybersecurity experts react to Biden’s EO SASE (pronounced sassy) essentially is a roadmap for … (more…)
Last update at: 2024-04-19 13:09:11
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter