The rapid advance of mobile security by Byron Acohido

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

We’ve come to rely on our smartphones to live out our digital lives, both professionally and personally.When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets while … (more…) ... Read More
How 'NDR' can secure 'IoT' by Byron Acohido

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

There’s no stopping the Internet of Things now.Related: The promise, pitfalls of IoTCompanies have commenced the dispersal of IoT systems far and wide. Data collected by IoT devices will increasingly get ingested into cloud-centric networks where it will … (more…) ... Read More
SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

Application programming interface. API. It’s the glue holding digital transformation together.Related: A primer on ‘credential stuffing’APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere in the digital landscape, and more … (more…) ... Read More
BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

Cyber criminals who specialize in plundering local governments and school districts are in their heyday.Related: How ransomware became a scourgeRansomware attacks and email fraud have spiked to record levels across the U.S. in each of the past … (more…) ... Read More
The case for regular data purges by Byron Acohido

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far.Related: What we’ve learned from the massive breach of Capitol OneAt RSA 2020, I learned about how one of the routine … (more…) ... Read More
Automating security in DevOps by Byron Acohido

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.Related: A firewall for microservicesDevSecOps arose to insert security checks and balances into DevOps, aiming … (more…) ... Read More
A primer on micro-segmentation by Byron Acohido

NEW TECH: ‘Micro-segmentation’ security vendor Guardicore seeks to disrupt firewall market

| | Uncategorized
Agile software innovation is the order of the day. Wonderous digital services are the result.Related: Micro-segmentation taken to the personal device levelThe flip side, of course, is that an already wide-open attack surface – one that has been … (more…) ... Read More
A primer on 'Network Traffic Analysis' by Byron Acohido

Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

Defending business networks isn’t getting any easier. Companies can have the latest, greatest perimeter defenses, intrusion detection systems and endpoint protections – and attackers will still get through. Just ask Equifax or Capital One.Related: Why cybersecurity should reflect … (more…) ... Read More
Using 'ML' to automate cybersecurity by Byron Acohido

MY TAKE: Deploying ‘machine learning’ at router level helps companies prepare for rise of 5G

Machine learning (ML) and digital transformation (DX) go hand in glove.We’ve mastered how to feed data into pattern-recognition algorithms. And as we accelerate the digitalization of everything, even more data is being generated.Related: Defending networks with no perimeter… (more…) ... Read More
NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP  — technology

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR… (more…) ... Read More