Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact
 

Imminent threats

 

Why ‘Shadow IT’ must be addressed

By Byron Acohido By-passing the IT department in to order begin utilizing the hottest new technologies is something tech-savvy employees have been doing since the inception of corporate networks. Most often, these workers aren’t maliciously motivated. They are simply intolerant of plodding decision-making and so take it into their own hands to acquire and begin […]

Why network perimeters need to be redefined in the age of cloud computing

By Byron Acohido The rising business use of cloud services and mobile devices has opened a Pandora’s box of security exposures. Software as a Service (SaaS) tools like Salesforce.com, Gmail, Office 365 and Dropbox, as well as social media sites like Facebook, LinkedIn and Twitter, are all being heavily leveraged by companies large and small […]

Anatomy of an attack: Using Twitter to launch denial-of-service attacks against banks

By Byron Acohido (Editor’s note: This actual snapshot of a cutting-edge Distributed Denial of Service attack was discovered by analysts at security vendor Digital Shadows, which provides cyber situational awareness to its SMB and enterprise customers. Digital Shadows’ CTO James Chappell shared this detailed intelligence with LastWatchdog. In the accompanying video, F5 cybersecurity evangelist David […]

Why certain Heatbleed exposures won’t be so easy for bad guys to exploit

Heartbleed + Android: A Not-So Love Story from Lookout By Byron Acohido, Last Watchdog KINGSTON, Wash. – The security headaches raised by the Heartbleed coding flaw keep expanding. Ars Technica reporter Dan Goodin has broken stories about how the Canadian government and Yahoo Mail have been bitten by Heartbleed exploits in the wild. And there […]

Heartbleed remediated on thousands of enterprise apps, dozens still vunerable

By Byron Acohido, Last Watchdog KINGSTON, Wash. – Netskope, a new cloud app analytics company, has come up with a unique metric illustrating the scramble to patch Heartbleed vulnerabilities in widely deployed business apps. Netskope’s technology enables granular scoping for specific behaviors within the most popular apps used by companies and workers. It currently tracks […]

A roadmap for triaging Heartbleed exposures

By Byron Acohido, Last Watchdog The acute notoriety of Heartbleed is a good thing in this sense: it ought to compel CIOs and CISOs to drill down on developing a roadmap for dealing with exposures that could run very deep. The most worrisome aspect of Heartbleed arguably is the fact that  this gaping security hole […]

Über nasty Heartbleed bug exposes fabric of the Internet

By Byron Acohido, Last Watchdog KINGSTON, Wash. – An über nasty security flaw has arisen from the din to command the attention of the global security community, rightfully so. The so-called “Heartbleed” flaw represents a path bad guys can use to tap into OpenSSL, the open-source implementation of the SSL and TLS protocols that are […]