Need for mobile security intensifies by Byron Acohido

MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security issues posed by BYOD are as complex and difficult to address as ever. Meanwhile, the pressure for companies ... Read More
A platform approach to risk analysis by Byron Acohido

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market Enterprises, especially, tend to be methodical and plodding. Digital transformation is all about high-velocity innovation and on-the-fly ... Read More
The rise of machine identities by Byron Acohido

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the U.S. and the University of Surrey in the U.K. recently teamed up and found evidence of an emerging ... Read More
Q&A: How AI, digital transformation are shaking up revenue management in high tech,  life sciences

Q&A: How AI, digital transformation are shaking up revenue management in high tech, life sciences

A recent poll of some 300 senior executives from U.S.-based life sciences and high-tech manufacturing companies sheds light on how digital transformation – and the rising role of third-party partners – have combined to create unprecedented operational challenges in the brave new world of digital commerce. Related: AI one-upsmanship prevails ... Read More
Simplifying enterprise security decisions by Byron Acohido

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The best practices standards and protocols to pull off this delicate balancing act have been thoroughly vetted and are ... Read More
NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

NEW TECH: Critical Start delivers managed security services with ‘radical transparency’

It was in 2012 that CRITICALSTART burst onto the Managed Security Service Provider (MSSP) scene with bold intentions. Related: How SMBs can leverage threat intelligence. The Plano, TX-based company sought to elevate the “MSSP” space high above the accepted standard at the time. It set out to do this by ... Read More
The security case for NTA by Byron Acohido

NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

Digital transformation is all about high-velocity innovation. But velocity cuts two ways. Related: Obsolescence creeps into perimeter defenses Yes, the rapid integration of digital technologies into all aspects of commerce has enabled wonderful new services. But it has also translated into an exponential expansion of the attack surface available to ... Read More
Small banks, credit unions under attack by Byron Acohido

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder of the more than 10,000 U.S. firms are comprised of community banks and regional ... Read More
MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

President Trump’s constant mislabeling of mainstream news reports he doesn’t appreciate as “fake news” has done much to muddle the accurate definition of this profound global force – and obscure the societal damage this rising phenomenon is precipitating. Related: The scourge of ‘malvertising’ Fake news is the willful spreading of ... Read More
The case for 'cloud access security brokers' by Byron Acohido

MY TAKE: How ‘CASBs’ are evolving to close the security gaps arising from digital transformation

The Cloud Access Security Broker (CASB) space is maturing to keep pace with digital transformation. Related: CASBs needed now, more than ever Caz-bees first took shape as a cottage industry circa 2013 to 2014 in response to a cry for help from companies reeling from new Shadow IT exposures: the ... Read More