What are the priorities for CISOs in 2019?

Well, 2018 is a wrap and another year is behind us — and what a big year it was for cybersecurity. There have been numerous high-profile breaches, regulatory fines, and fascinating developments in how enterprises build and deploy their applications. And, more broadly, business transformation efforts have accelerated the speed ... Read More

NIST releases guidance for risk assessment automation

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to a multitude of cloud services. Meanwhile, they’re having difficulty finding skilled staff, and their development teams have been busily dismantling traditional waterfall development lifecycles for continuously delivered pipelines. While cloud, ... Read More

Lights out: Can the U.S. survive a ‘catastrophic’ power outage?

Recently, the President’s National Infrastructure Advisory Council (NIAC) examined the ability of the U.S. federal government to respond to and recover from a catastrophic power outage striking a large swath of the nation. What is a catastrophic power outage? It’s a power outage longer than a few days or even ... Read More

The FCC seeks to aggressively stem fraudulent robocalls with STIR and SHAKEN

| | security, Telecom
If your recent experience is anything like mine, your phone has been pummeled by robocalls. For whatever reason, throughout the past year, I’ve been inundated with calls from across the U.S. regarding health insurance, car insurance, investment scams, mortgage refinance … you name it. On a mobile phone it’s easy ... Read More

Healthcare survey finds abundance of medical device security overconfidence

When facing a determined adversary, it’s one thing to be confident, it’s quite another to be overconfident. But that’s what a new survey of healthcare IT professionals and biomedical engineers found: an overabundance of confidence when it comes to connected medical device security. According to the 2018 Zingbox Second Annual ... Read More

Continuous processes can complicate security, but also provide an answer

While cloud computing has promised to simplify the management of business-technology systems, it hasn’t exactly turned into a net simplification when it comes to security. Sure, cloud infrastructure platforms remove the complexity of having to secure the underlying infrastructure, and software-as-a-service and platform-as-a-service providers simplify many aspects of application security ... Read More

The app explosion and digital transformation drive rapid growth of the identity management market

The identity management market is growing much faster than the overall IT market, and for good reason. While the enterprise IT market is expected to grow by 3.5 percent through 2018, research firm Technavio predicts the worldwide identity and access management market will grow at 13 percent through 2022. Why? ... Read More

U.S. DOE seeks innovative cybersecurity technologies

To outsiders, energy is often considered a mundane industry that changes slowly, if at all. The reality is that the energy industry has been experiencing just as much digital transformation as most other modern industries, as energy producers and operators rush to digitize manual and mechanical processes so that they ... Read More

The case for the business benefits behind biometrics is growing

For roughly 20 years now surveys of enterprises and my own reporting have shown the use of biometric authentication to be a niche market. While enterprises have known certain levels of access should have some form of second factor authentication, multi-factor authentication didn’t really catch on beyond a few use ... Read More

The iPhone security enhancements you need to know about

Apple has officially set the date for its next iPhone event as September 12, 2018. The company is expected to announce a new line-up of iPhones and perhaps some other hardware. Of course, new phones means a new mobile operating system: iOS 12. And while iOS 12 will deliver improvements ... Read More
Loading...