Companies need CASBs now more than ever — to help secure ‘digital transformation’

Companies need CASBs now more than ever — to help secure ‘digital transformation’

When I first wrote about Cloud Access Security Brokers in 2015, so-called CASBs were attracting venture capital by the truckloads — and winning stunning customer testimonials. CASBs (pronounced caz-bees) originally sought to resolve a fast rising security nightmare: Shadow IT. Related podcast: Web gateways emerge as crucial defense layer Striving ... Read More
How ‘digital transformation’ gave  birth to a new breed of criminal: ‘machine-identity thieves’

How ‘digital transformation’ gave birth to a new breed of criminal: ‘machine-identity thieves’

There’s a new breed of identity thief at work plundering consumers and companies. However, these fraudsters don’t really care about snatching up your credentials or mine. By now, your personal information and mine has been hacked multiple times and is readily on sale in the Dark Web. This has long ... Read More
GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The discovery of sensitive U.S. military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. However, details of the underlying hack, ferreted out and shared by researchers of the Insikt Group, an arm of the security research firm Recorded Future, ... Read More
Securing cloud authentications by Byron Acohido

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

We’re undergoing digital transformation, ladies and gentlemen. And we’re in a nascent phase where clever advances are blossoming even as unprecedented data breaches arise in parallel. The latest example of this dichotomy comes from Timehop, a service that enables social media users to plug into their past. On Sunday, Timehop ... Read More
MY TAKE: These 7 nation-state backed hacks have put us on the brink of a global cyber war

MY TAKE: These 7 nation-state backed hacks have put us on the brink of a global cyber war

Nation-state backed hacking collectives have been around at least as long as the Internet. However, evidence that the ‘golden age’ of cyber espionage is upon us continues to accumulate as the first half of 2018 comes to a close. Related podcast: Obsolescence is creeping into legacy security systems What’s changed ... Read More
The case for multi-factor authentication by Byron Acohido

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. Most individuals today are nonplussed when required, under certain circumstances, to retrieve a one-time passcode, pushed out in a text message ... Read More
MY TAKE: Knowing these 5 concepts will protect you from illicit cryptocurrency mining

MY TAKE: Knowing these 5 concepts will protect you from illicit cryptocurrency mining

The cryptocurrency craze rages on, and one unintended consequence is the dramatic rise of illicit cryptocurrency mining. It takes computing power to transform digital calculations into crypto cash, whether it be Bitcoin or one of the many other forms of digital currency. Related podcast: How cryptomining malware is beginning to ... Read More
GUEST ESSAY: Here’s why Tesla has been sabotaged twice in two years — lax network security

GUEST ESSAY: Here’s why Tesla has been sabotaged twice in two years — lax network security

The disclosure earlier this week that Tesla CEO Elon Musk reportedly informed all of his employees about a rogue worker conducting “extensive and damaging sabotage” to the company’s operations very much deserves the news coverage it has gotten. Related: The ‘golden age’ of cyber spying is upon us Musk reportedly ... Read More
Cryptocurrency mining casts shadow on cloud services by Byron Acohido

Will cryptocurrency mining soon saturate AWS, Microsoft Azure and Google Cloud?

Don’t look now but cryptojacking may be about to metastasize into the scourge of cloud services. Cryptojacking, as defined by the Federal Trade Commission, is the use of JavaScript code to capture cryptocurrencies in users’ browsers without asking permission. There’s a temptation to dismiss it as a mere nuisance; companies ... Read More
Mobile wallets need tighter security by Byron Acohido

VASCO rebrands as OneSpan, makes acquisition, to support emerging mobile banking services

Bank patrons in their 20s and 30s, who grew up blanketed with digital screens, have little interest in visiting a brick-and-mortar branch, nor interacting with a flesh-and-blood teller. This truism is pushing banks into unchartered territory. They are scrambling to invent and deliver a fresh portfolio of mobile banking services ... Read More
Loading...