Cyber Warranties Could Be Next Big Service Provider Differentiator

As worries about third-party risks continue to press on the minds of technology decision-makers within organizations large and small, many technology service providers are finding security to be a key differentiator for winning over prospects. Cyber warranties could be the next big way to help them signal to customers that they're serious about security risks.
Read more

No End in Sight for IoT Botnet Growth

When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an Internet of Things (IoT)-powered botnet, cybersecurity experts warned that this was just the warm-up act. Mirai marked the first splashy real-world example of the kind of attacks that the bad guys could carry out when harnessing the power of IoT devices in a well-controlled botnet. And as predicted by experts following the rollout of Mirai, the hits just keep coming via IoT botnets.
Read more

Leaky Buckets: 10 Worst Amazon S3 Breaches

The last year has proved out about security naysayers' warnings about the undisciplined use of cloud architectures. While many organizations work hard to secure data stored on cloud stores, the truth is that there's a lot of work to go. That fact is made abundantly clear by the growing number of incidents caused by extremely poor security hygiene within Amazon Simple Storage Service (S3) storage buckets that are holding very sensitive information.
Read more

DevSecOps: 2018 is the Year Quality and Security Finally Merge

A flaw is a flaw is a flaw. And as DevSecOps practices take root in an enterprise, don’t be surprised when software engineering teams are finally able to let this concept bear fruit in a meaningful way—namely through the practical merger between quality assurance and security. Philosophically, the idea that security is at least an..
Read more

5 (Other) Embarrassing Cyber Consulting Firm Breaches

It might be fashionable to heap scorn on the cybersecurity consultants at Deloitte for being unable to protect their own firm from a pretty gawd-awful breach. After all, the breach that came to light last week showed that the firm was picked off by attackers due to some shaky internal practices—namely, failing to enable two-factor..
Read more

7 Deadly Sins of Security Practitioners 

The threat of cyberattack continues to strain the resources of even the most well-funded cybersecurity programs. According to one survey from KPMG earlier this year, 88 percent of organizations today have suffered a cyberattack in the past 12 months. As a result of these incidents, more than half suffered a business process disruption and more..
Read more