PODCAST: Leveraging cloud services doesn’t absolve companies of security responsibilities

170526_globalscape-logo 275By Byron Acohido

When Globalscape got started more than 20 years ago, the internet was in its infancy and the obstacles to making it reliable for commerce were obvious and comparatively simple.

Back then, organizations needed a way to securely transfer files up into this thing called the World Wide Web. So Globalscape pioneered a personal file sharing tool, called CuteFTP, and developed that service into …more

PODCAST: WhiteHat Security’s threat researchers combat website hackers

Ryan O’Leary likes to think of himself as a military leader in command of a platoon of soldiers responsible for wresting control of vital turf before the enemy can get there.

O’Leary’s official title is vice president for technical support at WhiteHat Security. In that capacity he serves as the director of WhiteHat’s Threat Research Center, staffed by some 200 crack security analysts and researchers.

WhiteHat’s customers, composed largely of midsize and large enterprises, …more

VIDEO: Why the rising use of biometric authentication is driving states to regulate privacy

biometrics eyeball 350pxBy Byron Acohido

Using biometrics to verify one’s identity is no longer something you’d expect to see only in a Hollywood depiction of a dystopian future. Biometric identification has been in practical use for a while now, and the technology is getting more sophisticated every day.

As you might expect, privacy concerns have arisen along the way. And now the legal ramifications are getting more complicated.

Washington …more

Remember Conficker? WannaCry revives self-spreading worms – with nasty twists

sh wannacryBy Byron Acohido

The landmark WannaCry ransomware attack, I believe, may have been a proof of concept experiment that inadvertently spun out of control after it got released prematurely.

But now that it’s out there, WannaCry signifies two developments of profound consequence to company decision-makers monitoring the cybersecurity threat landscape:

• It revives the self-propagating internet worm as a preferred way to rapidly spread new exploits, machine to machine, with no user action …more

PODCAST: Putting machine learning to work ferreting out data anomalies

By Byron Acohido

Machine learning has been a staple of our consumer-driven economy for some time now.

When you buy something on Amazon or watch something on Netflix or even pick up groceries at your local supermarket, the data generated by that transaction is invariably collected, stored, analyzed and acted upon.

Machines, no surprise, are perfectly suited to digesting mountains of data, observing our patterns of consumption, and creating profiles of our behaviors that help companies better market their goods and services to …more

The case for improved ‘identity access managment’ (IAM)

sh_IAMBy Byron Acohido

Savvy companies are fighting back against cyber criminals by improving their identity and access management programs.

Taking stock of and instituting best practices policies for IAM, as it’s referred to in security circles, can lead to major improvements of network security.

So says Citrix, the software giant that provides server, application and desktop virtualization systems used widely in commerce.

IAM refers to the policies and technologies that ensure the …more

PODCAST: How ‘DNS’ drives the good, the bad and the nasty on the Internet

By Byron Acohido

170215_Paul Vixie4_520px

When the internet was in its infancy, numeric IP addresses were being created and assigned in an increasing frenzy, and a way was needed for humans to make sense of it all.

So a University of Southern California researcher named Paul Mockapetris, with help from a colleague, Jon Postel, invented something called the Domain Name System, aka DNS, to assign actual names to IP addresses. Not long …more