
SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread
Human suffering and economic losses weren’t the only two things that escalated with the spread of Covid 19 last year. Related: Can ‘SASE’ help companies secure connectivity? Network breaches also increased steadily and dramatically month-to-month in 2020. This development is … (more…) ... Read More

GUEST ESSAY: Now more than ever, companies need to proactively promote family Online Safety
bacohido | | Best Practices, For Consumers, For Technologists, Guest Blog Post, Steps forward, Top Stories
Cybersecurity training has steadily gained traction in corporate settings over the past decade, and rightfully so. In response to continuing waves of data breaches and network disruptions, companies have made a concerted effort and poured substantial resources into promoting data … (more…) ... Read More

GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige
The Health Insurance Portability and Accountability Act — HIPAA — has undergone some massive changes in the past few years to minimize the burden of healthcare entities. Related: Hackers relentless target healthcare providers Despite these efforts, covered-entities and business associates … (more…) ... Read More

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular
It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks. Related: The quickening of cyber warfare The latest twist: mobile network operator UScellular on Jan. 21 disclosed how cybercriminals broke into its Customer … (more…) ... Read More

AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks
bacohido | | Best Practices, Book Excerpts, For Consumers, For Technologists, Privacy, Steps forward, Top Stories
The cybersecurity operational risks businesses face today are daunting, to say the least. Related: Embedding security into DevOps. Edge-less networks and cloud-supplied infrastructure bring many benefits, to be sure. But they also introduce unprecedented exposures – fresh attack vectors that … (more…) ... Read More

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises
SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Related: Digital certificates destined to play key role in securing DX Thanks to a couple of milestone hacks disclosed at the close of … (more…) ... Read More

MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital
Plato once sagely observed, “A good decision is based on knowledge and not on numbers.” Related: How a Russian social media site radicalized U.S. youth That advice resonates today, even as we deepen our reliance on number crunching — … (more…) ... Read More

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy
Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are … (more…) ... Read More

Q&A: Here’s why securing mobile apps is an essential key to tempering political division
Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives. Related: How a Russian social media app … (more…) ... Read More

MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males
How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided? It’s tempting to place the lion’s share of the blame on feckless political leaders and facile … (more…) ... Read More