Guest Blog Post
7 tips for safer mobile device use
May 23, 2013
(Editor’s note: David Jevans, founder and CTO of Marble Security, also donates time as chairman of the non-profit Anti-Phishing Working Group. In this guest essay, Jevan outlines why mobile devices create new risks – and what you can do about it.)
As our daily use of iPhones, iPads and Android devices increases, cybercriminals are focusing their efforts on attacking us as we use our mobile devices.
Attackers want to get passwords to online services, including those we access with our mobile …More
How IAM systems help protect online accounts
May 21, 2013
(Editor’s note: Getting denied access to one of your online financial accounts can mean that security measures are playing it safe, on your behalf. In this guest essay, co-authors Irfan Saif and David Mapgaonkar of Deloitte’s security and privacy practice, offer a dose of clarity about Identity Access Managment systems.)
By Irfan Saif and David Mapgaonkar
Staying ahead of savvy cyber-criminals is a constant struggle.
Companies often deploy solutions to specific problems, such as controlling access to their web site or managing …More
Security vendors get boost from rising threats
May 21, 2013
SEATTLE – Rising cyberthreats are translating into booming business for companies supplying technologies that help secure networks and protect sensitive data.
Case in point: Silicon Valley-based risk management integrator Agiliance recently announced a 65% increase in sales for the first quarter, including a 415% boost in revenue from financial services clients.
LastWatchdog asked Torsten George, chief product strategist for Agiliance, for his perspective riding this wave.
Why mobile devices are weakest link
May 21, 2013
(Editor’s note: Mobile devices have become a primary targets for hackers and cyber criminals. In this guest essay, Rainer Enders, CTO of Americas at NCP engineering, explains why they’ve become the a weak link in network defenses.)
Mobile technology companies focus first and foremost on consumers rather than the corporate market. As such, most mobile operating systems lack many of basic security features. What’s more, with so many models from myriad manufacturers running on different versions of a platform such …More
Five steps to protect your small business
May 20, 2013
(Editor’s note: One of many proof points that small businesses are being heavily targeted by cybercriminals comes from Verizon’s 2013 Data Breach Investigations Report, in which three-quarters of the cases investigated occurred at companies with 100 employees or less. In this guest essay, Tim Francis, Enterprise Cyber Lead for Travelers Bond & Financial Products, offers small business owners a few pointers.)
By Tim Francis
There is little doubt that small businesses face a growing cyberthreat – and hackers are not showing …More
Feds upgrade alert on destructive Shamoon virus
May 16, 2013
It’s been 9 months since the milestone Shamoon virus wreaked havoc at Aramco. Shamoon was not designed to steal data. Nor was it just another garden variety denial of service attack, intended to disrupt and embarrass. Shamoon’s express purpose was the crippling the Saudi Arabian national oil and natural gas company. It accomplished its mission, destroying data on some 30,000 desktops and servers at the oil company.
(Editor’s note: One lucrative cybercrime involves directing a botnet – a network of infected PCs – to click on ads, and thus generate payments from the advertiser to the controller of the botnet. In this guest essay, Gurbaksh Chahal, founder and CEO of RadiumOne, outlines a variation on this caper, known as pixeljacking.)
By Gurbaksh Chahal
The hallowed halls of social media are no longer safe. Not when the operators of botnets like Chameleon are able to systematically steal $6 million …Morekeep looking »