Top Stories

 

PODCAST: Former White House CIO — companies need cyber defense strategy

By Byron Acohido Theresa Payton honed her cybersecurity skills as the White House’s first female chief information officer, under President George W. Bush. Payton is now president and CEO of cybersecurity consulting company Fortalice Solutions. I had the chance to interview her at the recent Enfuse 2017 cybersecurity conference in Las Vegas. We discussed how […]

Three fundamental steps to begin addressing third-party risks

By Byron Acohido Managing third party risk still does not still does not command a high priority in all too many organizations – even after the apocalyptic Target data breach of 2013 that routed through an HVAC vendor. But that’s slowly beginning to change. There is a growing recognition of the sprawling exposures that are […]

Why WannaCry signals a coming wave of nation-state cyber weapon hacks

By Byron  Acohido Companies would be remiss to downplay the profound implications of last month’s headline-grabbing WannaCry ransomware attack. WannaCry was a mere harbinger; the tip of the iceberg. WannaCry happened a few weeks after the Shadow Brokers hacking collective stole dozens of the National Security Agency’s ace-in-the-hole hacking tools. Shadow Brokers futilely tried to […]

VIDEO: Why the NIST framework is so fundamental to network security

By Byron Acohido Put aside the cyber threats, which continue to worsen. All any company decision-maker needs to do is pay heed to the intensifying regulatory environment to understand that network security has become a mission-critical operational issue. Consider that the Colorado Division of Securities is implementing 90 pages of new rules to clarify what […]

In the news: intel confirms Russians executed cyber attacks on election systems, officials

(News reports aggregated by Byron Acohido) Russian military intelligence executed a cyber attack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to an intelligence report. The top-secret National Security Agency document analyzes intelligence very recently acquired by the […]

Remember Conficker? WannaCry revives self-spreading worms – with nasty twists

By Byron Acohido The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely. But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape: • It revives the self-propagating […]

PODCAST: How ‘DNS’ drives the good, the bad and the nasty on the Internet

By Byron Acohido When the internet was in its infancy, numeric IP addresses were being created and assigned in an increasing frenzy, and a way was needed for humans to make sense of it all. So a University of Southern California researcher named Paul Mockapetris, with help from a colleague, Jon Postel, invented something called […]