Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact



PODCAST: How ‘Identity Access Management’ – IAM – authenticates network connections

By Byron V.  Acohido From the start of this 21st century companies continually scrambled to embrace ever more complex digital systems. Business networks connect an astounding variety of devices than to a vast array of tools and services residing on company premises and in the Internet cloud. An amazing cascade of logons and digital handshakes […]

PODCAST: Cyber forensic technology helps law enforcement keep terrorists in check

By Byron V. Acohido For every horrific act of terrorism that gets carried out there are very likely dozens of plots that get thwarted by authorities using leading-edge cyber forensics tools to track malicious threat actors as that they communicate and transact across the Internet. Nuix is a Sydney, Australia-based company that supplies a well-established […]

PODCAST: Core Security makes the case for penetration testing as an essential layer of defending networks

By Byron V. Acohido The Equifax debacle has a lot to teach us about how – and how not to – handle a data breach. The massive breach resulted in hackers accessing the social security numbers, birth dates, home addresses and driving license numbers for up to 143 million Americans and the credit card numbers […]

PODCAST: How Cyxtera came to bring a security-first approach to colocation datacenters

By Byron V. Acohido Cyxtera is a colocation datacenter business with a fascinating pedigree and a new, security-first,  approach to datacenter services. I spent some time with Randy Rowland, Chief Product Officer at Black Hat 2017 in Las Vegas to hear more about the trajectory of the business to date. Colocation data centers are facilities […]

PODCAST: Does the iPhone’s facial recognition technology go too far ?

By Byron V. Acohido The release of the new iPhone X (don’t call it ‘X,’ say ‘ten’or iPhone X), with its facial identification activation feature, has sparked interest in the latest developments in biometric security. I spoke with Corey Nachreiner, chief technology officer of WatchGuard Technology, about the advantages – and risks – involved in […]

PODCAST: The case for making ‘application security’ a top priority

By Byron V. Acohido Convenience has its price. The truism rears its head often in cybersecurity, particularly as web applications delivered via the internet cloud have come to pervade digital commerce. Nearly all businesses and government organizations now offer services—such as online payments—through web applications. And the staggering amount of data flowing through such applications […]

PODCAST: Startup FFRI unveils high-flying approach to detecting leading-edge malware

By Byron V. Acohido Over the past 10 years or so, machine learning has come to dominate our digital lives. Commercial entities crunch mountains of data, leveraging “intelligent” mathematical algorithms at a furious pace. Much of this is done as part of the massively profitable endeavor of shaping consumer preferences and behaviors—to a degree unimagined by the best-and-brightest sci-fi […]