For technologists

 

Machine learning shows promise for improving cyber defenses

By Byron Acohido LAS VEGAS — The cyber security sector  generates mountains of data. Security Information & Event Management, or SIEM, systems, like Splunk, generate logs of all network traffic. Threat data pours in from next generation firewalls, endpoint security systems, intrusion prevention and  detection systems and vulnerability management systems. A growing crop of threat […]

Ransomware rampage takes aim at business targets

sh_ransomware_7502

By Byron Acohido Consumers are no longer the prime target of ransomware campaigns. After years of petty thievery on a global scale – locking up the computer screens of millions of consumers with scams to sell bogus $79 antivirus clean-up services  –  they’ve turned their attention to much bigger fish. The opening quarter of this […]

Why ‘Shadow IT’ must be addressed

shutterstock_274479842

By Byron Acohido By-passing the IT department in to order begin utilizing the hottest new technologies is something tech-savvy employees have been doing since the inception of corporate networks. Most often, these workers aren’t maliciously motivated. They are simply intolerant of plodding decision-making and so take it into their own hands to acquire and begin […]

Why network perimeters need to be redefined in the age of cloud computing

By Byron Acohido The rising business use of cloud services and mobile devices has opened a Pandora’s box of security exposures. Software as a Service (SaaS) tools like Salesforce.com, Gmail, Office 365 and Dropbox, as well as social media sites like Facebook, LinkedIn and Twitter, are all being heavily leveraged by companies large and small […]

Pulitzer Centennial highlights role of journalism

By Byron Acohido Standing on the floor of the Newseum in Washington, D.C., last week, in a crush of hundreds of past recipients of The Pulitzer Prize, was thrilling and humbling. We were assembled for a group photo as part of the yearlong celebration of the Pulitzer’s centennial. It was a chance to reconnect with […]

Anatomy of an attack: Using Twitter to launch denial-of-service attacks against banks

By Byron Acohido (Editor’s note: This actual snapshot of a cutting-edge Distributed Denial of Service attack was discovered by analysts at security vendor Digital Shadows, which provides cyber situational awareness to its SMB and enterprise customers. Digital Shadows’ CTO James Chappell shared this detailed intelligence with LastWatchdog. In the accompanying video, F5 cybersecurity evangelist David […]

A roadmap for triaging Heartbleed exposures

By Byron Acohido, Last Watchdog The acute notoriety of Heartbleed is a good thing in this sense: it ought to compel CIOs and CISOs to drill down on developing a roadmap for dealing with exposures that could run very deep. The most worrisome aspect of Heartbleed arguably is the fact that  this gaping security hole […]