Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact
 

For technologists

 

NEWS THIS WEEK: Kaspersky ban underway for U.S. agencies; Equifax data breach lawsuits pile up; Europe plans new agency to quell cyber threats

By Byron V. Acohido The U.S. government moved to ban the use of a Russian brand of security software by federal agencies amid concerns the company has ties to state-sponsored cyber espionage activities. Acting Homeland Security Secretary Elaine Duke ordered that federal civilian agencies identify Kaspersky Lab software on their networks. After 90 days, unless otherwise directed, […]

PODCAST: How web browsers present an attack vector useful to criminal hackers — and business rivals

By Byron V. Acohido Web browsers continue to represent, arguably, the most wide-open attack vector at any given company. This is because Mozilla Firefox, Google Chrome, Microsoft Explorer and Apple Safari all use a basic architecture ideally suited for a threat actor to manipulate. To put it bluntly, it’s all too easy for an attacker to download […]

PODCAST: How a daily ‘cyber hygiene’ routine can prevent a catastrophic network breach

By Byron V. Acohido Cyber attacks don’t discriminate between small and large businesses. Despite small business owners believing they are too small to be at risk, 43 percent of cyber attacks target small businesses. Yet, only one in four small businesses are prepared for such an attack, according to a recent report by Symantec. Related article: […]

ROUNDTABLE: Will massive Equifax breach be the wake up call for companies, regulators, consumers?

By Byron V. Acohido The pain has only just begun for Equifax. Last Thursday, the giant credit bureau disclosed that hackers stole personal information for 143 million of its customers, presumably mostly Americans, but also Canadians and Europeans. In less than 24 hours, two Oregonians, Mary McHill and Brook Reinhard, filed a federal class-action lawsuit […]

PODCAST: Why ‘machine identities’ represent a wide-open attack vector — and what your company should do about it

By Byron V. Acohido Companies spend about $8 billion a year on identity and access management (IAM) systems, geared to keep track of humans, but spend practically nothing guarding machine identities. This is a problem because, according to consultancy firm Gartner, 50 percent of all network attacks in 2017 will use stolen or forged machine […]

PODCAST: Survey shows consumers fully aware of ‘smart home’ security, privacy risks

By Byron V. Acohido If you don’t already have an Internet of Things (IoT) device in your home, chances are you will in the not too distant future. Following record growth in 2016, which saw 80 million smart devices delivered to homes across the world (an increase of 64 percent from the year before), analysts […]

VIDEO: Tempered Networks introduces ‘identity-based networking’

By Byron V. Acohido Tempered Networks got its start by taking a unique approach toward locking down the industrial control systems (ICS) used at the Boeing Co.’s airplane manufacturing plants. The problem Boeing was trying to solve at the time turns out to be much the same as the puzzle organizations of all types face today: How […]