Imminent threats

 

PODCAST: Former White House CIO — companies need cyber defense strategy

By Byron Acohido Theresa Payton honed her cybersecurity skills as the White House’s first female chief information officer, under President George W. Bush. Payton is now president and CEO of cybersecurity consulting company Fortalice Solutions. I had the chance to interview her at the recent Enfuse 2017 cybersecurity conference in Las Vegas. We discussed how […]

Why WannaCry signals a coming wave of nation-state cyber weapon hacks

By Byron  Acohido Companies would be remiss to downplay the profound implications of last month’s headline-grabbing WannaCry ransomware attack. WannaCry was a mere harbinger; the tip of the iceberg. WannaCry happened a few weeks after the Shadow Brokers hacking collective stole dozens of the National Security Agency’s ace-in-the-hole hacking tools. Shadow Brokers futilely tried to […]

Remember Conficker? WannaCry revives self-spreading worms – with nasty twists

By Byron Acohido The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating […]

PODCAST: How ‘DNS’ drives the good, the bad and the nasty on the Internet

By Byron Acohido When the internet was in its infancy, numeric IP addresses were being created and assigned in an increasing frenzy, and a way was needed for humans to make sense of it all. So a University of Southern California researcher named Paul Mockapetris, with help from a colleague, Jon Postel, invented something called […]

Video: good guy Chris Vickery hunts exposed data

By Byron Acohido Two more stunning disclosures from self-styled internet watchdog Chris Vickery underscore how organizations continue to routinely expose sensitive data in the cloud, risking dire consequences. “My findings clearly demonstrate that data breaches happen more often than the general public realizes, and companies are quick to deny and cover up these issues,” Vickery […]

Why dormant SSH keys represent a nightmarish exposure

By Byron Acohido A nightmarish new exposure affecting virtually all major networks is just beginning to get the attention of the security community. It involves a fundamental networking protocol—Secure Shell, or SSH. Invented in 1995 by a Finnish programmer named Tatu Ylönen, SSH is an encrypting routine that enables one software application to securely connect […]

How open source flaws pose a rising threat to all businesses

By Byron Acohido Arguably the biggest security blind spot in just about every business network is something too few security executives are aware of, much less focusing on: open source software vulnerabilities. This truism first rose to the fore in 2014 with the flurry of malicious activity following the discovery of gaping defects in three […]