Home Podcasts Videos Guest Posts Q&A News This Week Bio Contact

GUEST ESSAY: A look at how security technology has kept pace with the rising use of business data

By Nir Polak, CEO of Exabeam

IT systems have never been more powerful or accessible to businesses. However, the scope and scale of cyber crimes continues to outpace tech innovation.

For years, the challenge for internal IT and security teams has been to use existing company data to construct an integrated picture of oddities and unexpected actions on their network. Recent advancements in machine learning and behavior or anomaly-based analytics that leverage existing enterprise logs have provided security teams with much …more

NEWS THIS WEEK: Google resists Europe’s privacy rules; Ashley Madison pays $11 million to settle privacy breach suit; hacker grabs control of Segway scooter

By Byron V. Acohido

In the news this week, Europe’s “right to be forgotten” ruling, which allows private citizens in the region to make requests that search engines delist incorrect, irrelevant or out of date information returned by an online search for their full name, is set to return to the region’s top court to settle an ongoing dispute between Google and the French data protection agency, CNIL. The latter has pushed for Google to make these delistings apply globally, across …more

GUEST ESSAY: Why neutralizing insider threats should be a much higher priority

By Thomas Jones, systems engineer, Bay Dynamics

As we have seen in the headlines, insider threats are a constant challenge for government agencies. But the problem comes with one silver lining. Each time a successful insider threat strikes, it pushes agencies to bolster their cybersecurity programs.

The National Industrial Security Program Operating Manual (NISPOM) Change 2 is an example of just that. Released by the U.S. Department of Defense in May 2016, NISPOM Change 2 mandates federal contractors implement an insider …more

NEWS THIS WEEK: Face scan may be required to travel abroad; Trump hotels violate privacy; Verizon exposes data

By Byron V. Acohido

In the news this week, U.S. citizens boarding international flights might have to submit to a face scan. The Department of Homeland Security says it’s the only way to successfully expand a program that tracks nonimmigrant foreigners. They have been required by law since 2004 to submit to biometric identity scans—but to date have only had their fingerprints and photos collected prior to entry. Now, DHS says it’s ready to implement face scans on departure—aimed mainly at …more

GUEST ESSAY: What you should know about how ‘unstructured data’ exposes your operations

By Erik Brown, CTO at GigaTrust

Recent high-profile photo hacks have made headlines. In March, internet hackers targeted celebrities including Miley Cyrus, Emma Watson and Amanda Seyfried, among others, resulting in the leak of intimate photos that were posted on sites such as 4chan and Reddit. Similarly, back in 2014 hacker Ryan Collins exposed nude photos and videos of several celebrities after obtaining them from iCloud accounts.

But celebrities aren’t the only ones vulnerable to hackers. Imagine if your organization’s …more

NEWS THIS WEEK: Privacy group sues Trump administration; Pennsylvania county loses childrens’ records; WIndow 10 needs privacy update

By Byron V. Acohido

In the news this week, a privacy watchdog group is suing the Trump administration’s commission investigating alleged election fraud, saying the requested information violates voters’ privacy. The Electronic Privacy Information Center, a nonprofit research organization, filed for a temporary restraining order to block the Presidential Advisory Commission on Election Integrity from gathering voter records from state election officials. The commission has requested election officials provide voters’ birth date, party affiliation, partial Social Security numbers, voter history, felony …more

PODCAST: Tech advances arrive to help secure legacy industrials control

By Byron V. Acohido

Many critical infrastructure systems, such as those that control the electric grid, oil and gas refineries, and transportation, are now getting linked to the internet. That makes them easier to manage and maintain, but also could put them in the line of fire for cyber attacks.

I recently discussed the issues involved in upgrading and protecting these critical industrial control systems with Patrick McBride, chief marketing officer at Claroty, a startup that intends to secure the operational technology …more