SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

Human suffering and economic losses weren’t the only two things that escalated with the spread of Covid 19 last year. Related: Can ‘SASE’ help companies secure connectivity? Network breaches also increased steadily and dramatically month-to-month in 2020. This development is … (more…) ... Read More
GUEST ESSAY: Now more than ever,  companies need to proactively promote family Online Safety

GUEST ESSAY: Now more than ever, companies need to proactively promote family Online Safety

Cybersecurity training has steadily gained traction in corporate settings over the past decade, and rightfully so. In response to continuing waves of data breaches and network disruptions, companies have made a concerted effort and poured substantial resources into promoting data … (more…) ... Read More
GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige

GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige

The Health Insurance Portability and Accountability Act — HIPAA — has undergone some massive changes in the past few years to minimize the burden of healthcare entities. Related: Hackers relentless target healthcare providers Despite these efforts, covered-entities and business associates … (more…) ... Read More
ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks. Related: The quickening of cyber warfare The latest twist: mobile network operator UScellular on Jan. 21 disclosed how cybercriminals broke into its Customer … (more…) ... Read More
AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks

AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks

The cybersecurity operational risks businesses face today are daunting, to say the least. Related: Embedding security into DevOps. Edge-less networks and cloud-supplied infrastructure bring many benefits, to be sure. But they also introduce unprecedented exposures – fresh attack vectors that … (more…) ... Read More
Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

| | For Technologists, Top Stories
SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Related: Digital certificates destined to play key role in securing DX Thanks to a couple of milestone hacks disclosed at the close of … (more…) ... Read More
MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital

MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital

Plato once sagely observed, “A good decision is based on knowledge and not on numbers.”  Related: How a Russian social media site radicalized U.S. youth That advice resonates today, even as we deepen our reliance on number crunching — … (more…) ... Read More
GUEST ESSAY:  5 steps for raising cyber smart children — who know how to guard their privacy

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are … (more…) ... Read More
Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives. Related: How a Russian social media app … (more…) ... Read More
MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided? It’s tempting to place the lion’s share of the blame on feckless political leaders and facile … (more…) ... Read More