Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are constantly … (more…) ... Read More
GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve better … (more…) ... Read More
CISOs climb into the hot seat by Byron Acohido

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal valuesCISOs must preserve and protect their … (more…) ... Read More
MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level.Related: How the Middle East has advanced mobile security regulationsOver the past couple of decades, meaningful initiatives to improve online privacy … (more…) ... Read More
The case for 'shift left' deep testing in software development by Byron Acohido

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of designing, prototyping, testing and delivering new … (more…) ... Read More
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks. And startups today typically launch with … (more…) ... Read More
MY TAKE: Why COVID-19 ‘digital distancing’ is every bit as vital as ‘social distancing’

MY TAKE: Why COVID-19 ‘digital distancing’ is every bit as vital as ‘social distancing’

As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.Related: Coronavirus scams leverage emailAs we get deeper into dealing with the coronavirus outbreak, the need for authorities and experts to communicate … (more…) ... Read More
SHARED INTEL:  New book on  cyber warfare foreshadows attacks on elections, remote workers

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.Related: The Golden Age of cyber spyingA new book by Dr. Chase Cunningham — … (more…) ... Read More
The case for tracking 'privileged activities' by Byron Acohido

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea was to make sure … (more…) ... Read More
Making Windows Active Directory security resilient by Byron Acohido

NEW TECH: Semperis introduces tools to improve security resiliency of Windows Active Directory

Ransomware continues to endure as a highly lucrative criminal enterprise.Ransomware hacking groups extorted at least $144.35 million from U.S. organizations between January 2013 and July 2019. That’s the precise figure recently disclosed by the FBI — the true damage … (more…) ... Read More