bacohido, Author at Security Boulevard
The Third Industrial Revolution: A Radical New Sharing Economy

MY TAKE: Can Project Wildland’s egalitarian platform make Google, Facebook obsolete?

Most of the people I know professionally and personally don’t spend a lot of time contemplating the true price we pay for the amazing digital services we’ve all become addicted to. Related: Blockchain’s role in the next industrial revolution I’ll … (more…) ... Read More
GUEST ESSAY: What everyone can — and should — do to mark Cybersecurity Awareness Month

GUEST ESSAY: What everyone can — and should — do to mark Cybersecurity Awareness Month

| | Best Practices, For Consumers
With new technological advancements comes a need for heightened security measures. Plenty of criminals are searching for vulnerabilities in networks, so it shouldn’t come as a surprise that cybersecurity issues have become more prevalent. Related: President Biden issues cybersecurity executive … (more…) ... Read More
GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints

GUEST ESSAY: A primer on the degrees of privacy tech companies assign to your digital footprints

In recent years, brands have started butting up against the line between convenience and privacy.  Shoppers love the convenience of personalized experiences that their data powers, but then horror stories such as the Cambridge Analytica scandal make people skeptical about … (more…) ... Read More
GUEST ESSAY: How SPDX helps reconcile interdependencies of open, proprietary software

GUEST ESSAY: How SPDX helps reconcile interdependencies of open, proprietary software

Software today is built on a combination of open source and proprietary software packages.  Developers can reuse and build on the packages created by others, which results in the rapid creation of new capabilities and technologies. Related: How SBOM factors … (more…) ... Read More
GUEST ESSAY: What it will take to train the next generation of cybersecurity analysts

GUEST ESSAY: What it will take to train the next generation of cybersecurity analysts

It is no secret that there is, and has been for some time, a shortage of trained cyber security professionals in corporate IT Security teams.  The Wharton School of the University of Pennsylvania observed that “nowhere is the workforce-skills gap … (more…) ... Read More
GUEST ESSAY: A breakdown of Google’s revisions to streamline its ‘reCAPTCHA’  bot filter

GUEST ESSAY: A breakdown of Google’s revisions to streamline its ‘reCAPTCHA’ bot filter

Most of us internet users are obviously familiar with CAPTCHAs: a challenge or test that is designed to filter out bots (automated programs) and only allow legitimate human users in. Related: How bots fuel ‘business logic’ hacking The basic principle … (more…) ... Read More
GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. Related: How Russia uses mobile apps to … (more…) ... Read More
Observability --  a path to help secure, optimize hybrid cloud networks by Byron Acohido

SHARED INTEL: How ‘observability’ has enabled deep monitoring of complex modern networks

An array of promising security trends is in motion. New frameworks, like SASE, CWPP and CSPM, seek to weave security more robustly into the highly dynamic, intensely complex architecture of modern business networks. Related: 5 Top SIEM myths… (more…) ... Read More
MY TAKE: Surfshark boosts ‘DIY security’ with its rollout of VPN-supplied antivirus protection

MY TAKE: Surfshark boosts ‘DIY security’ with its rollout of VPN-supplied antivirus protection

Surfshark wants to help individual citizens take very direct control of their online privacy and security. Thus, Surfshark has just become the first VPN provider to launch an antivirus solution as part of its all-in-one security bundle Surfshark One.… (more…) ... Read More
GUEST ESSAY: Why it’s worrisome that China has integrated Huawei switches into telecoms worldwide

GUEST ESSAY: Why it’s worrisome that China has integrated Huawei switches into telecoms worldwide

In the previous discussion, China’s 14th Five-Year Plan was summarized to capture relevant aspects of dual circulation, the Digital Silk Road (DSR), and the Belt Road Initiative (BRI) that aim to advance China as an economic, technological, and foreign policy … (more…) ... Read More

Techstrong Group