Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact
 

For technologists

 

PODCAST: How ‘Identity Access Management’ – IAM – authenticates network connections

By Byron V.  Acohido From the start of this 21st century companies continually scrambled to embrace ever more complex digital systems. Business networks connect an astounding variety of devices than to a vast array of tools and services residing on company premises and in the Internet cloud. An amazing cascade of logons and digital handshakes […]

GUEST ESSAY: 5 deadly sins for which companies reap their just reward: data breaches

By Morey Haber I love statistics. They are a valuable commodity in a discussion to formalize a point and validate your position. Many times, others will question the source, accuracy, or even meaning of a statistic to skew the results in their favor. In addition, a statistic taken out of context, or viewed on its […]

PODCAST: Cyber forensic technology helps law enforcement keep terrorists in check

By Byron V. Acohido For every horrific act of terrorism that gets carried out there are very likely dozens of plots that get thwarted by authorities using leading-edge cyber forensics tools to track malicious threat actors as that they communicate and transact across the Internet. Nuix is a Sydney, Australia-based company that supplies a well-established […]

PODCAST: Core Security makes the case for penetration testing as an essential layer of defending networks

By Byron V. Acohido The Equifax debacle has a lot to teach us about how – and how not to – handle a data breach. The massive breach resulted in hackers accessing the social security numbers, birth dates, home addresses and driving license numbers for up to 143 million Americans and the credit card numbers […]

PODCAST: How Cyxtera came to bring a security-first approach to colocation datacenters

By Byron V. Acohido Cyxtera is a colocation datacenter business with a fascinating pedigree and a new, security-first,  approach to datacenter services. I spent some time with Randy Rowland, Chief Product Officer at Black Hat 2017 in Las Vegas to hear more about the trajectory of the business to date. Colocation data centers are facilities […]

GUEST ESSAY: Trump’s Cybersecurity Executive Order is Only a Start

By Robert Ackerman Jr. President Trump last May signed a cybersecurity executive order (EO) outlining plans to improve data security for federal agencies and to better protect critical U.S. infrastructure. I view it as a call to action, more than past administrations have done. This alone makes it worthwhile. But it’s just a start. Much  […]

PODCAST: Does the iPhone’s facial recognition technology go too far ?

By Byron V. Acohido The release of the new iPhone X (don’t call it ‘X,’ say ‘ten’or iPhone X), with its facial identification activation feature, has sparked interest in the latest developments in biometric security. I spoke with Corey Nachreiner, chief technology officer of WatchGuard Technology, about the advantages – and risks – involved in […]