Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact
 

For technologists

 

NEWS THIS WEEK: Ukrainian hacker with tied to DNC hack surrenders; Uber agrees to improve privacy; Scottish paliament hacked

By Byron V. Acohido In the news this week, a Ukrainian hacker called “Profexer” who built one of the tools used to penetrate the Democratic National Committee servers last year has turned himself in to authorities. The man, who first contacted Ukrainian police earlier this year, claims he wrote a piece of software called the […]

PODCAST: A case for studying the ‘why’ of network breaches instead of just the ‘how’

By Byron V. Acohido Employees often are seen as the weakest link in cybersecurity. Breaches by hackers may hit the headlines, but in many instances human error (or intent) is responsible for the majority of attacks. IBM’s 2016 Cyber Security Index reported that insiders carried out 60 percent of all attacks. Three-quarters of these attacks […]

Q&A: Why the HBO hack is destined to accelerate the fledgling cyber insurance market

By Byron V. Acohido Following on the heels of the two globe-spanning ransomware worms, the HBO hack—with its distinctive blackmail component—rounds out a summer of extortion-fueled hacks and destruction and theft of valuable data at an unprecedented scale. WannaCry and Petya raced around the planet demanding ransoms after locking up servers at hundreds of organizations. The HBO […]

PODCAST: Want to know what the No. 1 cybersecurity VC firm is betting $300 million on? Give a listen

By Byron V. Acohido In 2016, venture capital firms invested in more startups than ever before. The year saw venture VC firms invest a total of $3.1 billion in 279 cybersecurity startups. This compares to $3.7 billion of investment in 272 startups in 2015 and $833 million in 117 startups in 2010. Levels of investment […]

PODCAST: Why securing networks requires a mind shift in the C-suite and board rooms

By Byron V. Acohido As technology has evolved, it’s gotten bigger and more complex, making the job of information technology departments more difficult. Dealing with Windows, Macs, the cloud and the Internet of Things (IOT) means they have to manage more things in more places. I had the chance to discuss this with Phil Lieberman, […]

PODCAST: Why securing ‘third-party’ risks has become so crucial

By Byron V. Acohido In the past couple of years, third-party risk has grown from a topic only discussed by cybersecurity circles to a companywide concern. The tipping point may have been in 2014 when Target’s point-of-sale (POS) system was compromised, and the details of 110 million in-store customers were stolen. How did the hackers […]

GUEST ESSAY: 6 ways to use a ‘secure code review’ to engrain security during software development

By Amit Ashbel, cybersecurity evangelist at Checkmarx An application or update is days, or possibly just hours away, from release and you’ve been working hard to ensure that security tools and processes are integrated throughout the development process. You believe you’ve followed all the steps and your app is ready to go, right? Wrong. You have one […]