SHARED INTEL: The expect impacts of Pres. Biden’s imminent National Cybersecurity Strategy

SHARED INTEL: The expect impacts of Pres. Biden’s imminent National Cybersecurity Strategy

The United States will soon get some long-awaited cybersecurity updates. Related: Spies use Tik Tok, balloons That’s because the Biden administration will issue the National Cyber Strategy within days. Despite lacking an official published document, some industry professionals have already … (more…) ... Read More
GUEST ESSAY: Data loss prevention beccomes paramount — expecially in the wake of layoffs

GUEST ESSAY: Data loss prevention beccomes paramount — expecially in the wake of layoffs

When a company announces layoffs, one of the last things most employees or even company owners worry about is data loss. Related: The importance of preserving trust in 2023 Valuable or sensitive information on a computer is exposed to theft … (more…) ... Read More
GUEST ESSAY: Wise precautions companies can take to prevent data loss in the wake of layoffs

GUEST ESSAY: Wise precautions companies can take to prevent data loss in the wake of layoffs

When a company announces layoffs, one of the last things most employees or even company owners worry about is data loss. Related: The importance of preserving trust in 2023 Valuable or sensitive information on a computer is exposed to theft … (more…) ... Read More
The case for automating management of PKI certificates and keys by Byron Acohido

FIRESIDE CHAT: New automated tools, practices ascend to help companies wrangle PKI

Arguably one of the biggest leaps forward an enterprise can make in operational reliability, as well as security, is to shore up its implementations of the Public Key Infrastructure. Related: Why the ‘Matter’ standard matters Companies have long relied on … (more…) ... Read More
GUEST ESSAY: Advanced tools are ready to help SMBs defend Microsoft 365, Google Workspace

GUEST ESSAY: Advanced tools are ready to help SMBs defend Microsoft 365, Google Workspace

Throughout 2022, we saw hackers become far more sophisticated with their email-based cyber attacks. Using legitimate services and compromised corporate email addresses became a norm and is likely to continue in 2023 and beyond. Related: Deploying human sensors Additionally, with … (more…) ... Read More
GUEST ESSAY: The common thread between China’s spy balloons and Congress banning Tik Tok

GUEST ESSAY: The common thread between China’s spy balloons and Congress banning Tik Tok

The decision by the House of Representatives to ban  TikTok  from federal devices is noteworthy, especially as the Chinese spy balloon crisis unfolds. Related: The Golden Age of cyber espionage On December 23, 2022, Congress, in a bipartisan spending bill, … (more…) ... Read More
GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress

GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress

The cybersecurity profession can be very rewarding, but at the same time quite taxing. Related: Equipping SOCs for the long haul In fact, stress factors  have risen to where some 45 percent of the security professionals polled in Deep Instinct’s … (more…) ... Read More
How MLSecOps can help shrink the attack surface by Byron Acohido

FIRESIDE CHAT: Can ‘MLSecOps’ do for MLOps, what DevSecOps is doing for DevOps?

Massively interconnected digital services could someday soon save the planet and improve the lives of one and all. Related: Focusing on security leading indicators But first, enterprises and small businesses, alike, must come to grips with software vulnerabilities that are … (more…) ... Read More
SHARED INTEL: Here’s why security analysts need to remain on high alert for fake bug reports

SHARED INTEL: Here’s why security analysts need to remain on high alert for fake bug reports

| | Guest Blog Post, Top Stories
In an ideal world, cybersecurity analysts would get legitimate daily reports on improving a company’s security. Unfortunately, the likelihood of being handed unsolicited, untrustworthy advice is high. Related: Tech giants foster third-party snooping This is what fake bug reports are … (more…) ... Read More
GUEST ESSAY — How threat detection services for SMBs are continuing to evolve and improve

GUEST ESSAY — How threat detection services for SMBs are continuing to evolve and improve

Small and medium-sized businesses are facing immense security challenges and these are the same as those of mid-size or larger enterprises. Related: Myths about safe browsing Clearly, SMBs need to be alert for cyberattacks, but they also need to stay … (more…) ... Read More