Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact

Top Stories


PODCAST: How ‘Identity Access Management’ – IAM – authenticates network connections

By Byron V.  Acohido From the start of this 21st century companies continually scrambled to embrace ever more complex digital systems. Business networks connect an astounding variety of devices than to a vast array of tools and services residing on company premises and in the Internet cloud. An amazing cascade of logons and digital handshakes […]

PODCAST: Cyber forensic technology helps law enforcement keep terrorists in check

By Byron V. Acohido For every horrific act of terrorism that gets carried out there are very likely dozens of plots that get thwarted by authorities using leading-edge cyber forensics tools to track malicious threat actors as that they communicate and transact across the Internet. Nuix is a Sydney, Australia-based company that supplies a well-established […]

PODCAST: Does the iPhone’s facial recognition technology go too far ?

By Byron V. Acohido The release of the new iPhone X (don’t call it ‘X,’ say ‘ten’or iPhone X), with its facial identification activation feature, has sparked interest in the latest developments in biometric security. I spoke with Corey Nachreiner, chief technology officer of WatchGuard Technology, about the advantages – and risks – involved in […]

ROUNDTABLE: The implications of Deloitte data breach, especially following hacks of Equifax, SEC

By Byron V. Acohido The astonishing rash of disclosures of data breaches at top-tier organizations continues. Big Four accounting firm Deloitte has joined Equifax and the U.S. Securities and Exchange Commission in going public about a catastrophic loss of sensitive data. Ironically, Deloitte a few years ago branched from its core auditing and tax services […]

PODCAST: The case for making ‘application security’ a top priority

By Byron V. Acohido Convenience has its price. The truism rears its head often in cybersecurity, particularly as web applications delivered via the internet cloud have come to pervade digital commerce. Nearly all businesses and government organizations now offer services—such as online payments—through web applications. And the staggering amount of data flowing through such applications […]

PODCAST: Startup FFRI unveils high-flying approach to detecting leading-edge malware

By Byron V. Acohido Over the past 10 years or so, machine learning has come to dominate our digital lives. Commercial entities crunch mountains of data, leveraging “intelligent” mathematical algorithms at a furious pace. Much of this is done as part of the massively profitable endeavor of shaping consumer preferences and behaviors—to a degree unimagined by the best-and-brightest sci-fi […]

Equifax hack sheds light on ripe attack vector: open-source protocols used in business networks

A major takeaway from the Equifax debacle that hasn’t gotten enough attention is this: The massive data theft happened because of a vulnerability in an open-source component, which the credit bureau failed to lock down. Remember Heartbleed and Shellshock, the two massive security flaws discovered in open-source internet protocols back in 2014? The waves of network […]