Syndicated Blog

The Last Watchdog
on Internet security by Byron Acohido
BEST PRACTICES: How to protect yourself from the enduring scourge of malvertising

BEST PRACTICES: How to protect yourself from the enduring scourge of malvertising

| | My Take, Top Stories
Malvertising is rearing its ugly head – yet again. Malicious online ads have surged and retreated in cycles since the earliest days of the Internet. Remember when infectious banner ads and viral ...
Why web application vulnerabilities endure by Byron Acohido

Web application exposures continue to bedevil companies as digital transformation accelerates

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber ...
GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data, which sooner or later can be traced back to you. Related: ...
The case for post-quantum crypto by Byron Acohido

MY TAKE: Get ready to future-proof cybersecurity; the race is on to deliver ‘post-quantum crypto’

| | My Take, Podcasts, Q & A, Top Stories
Y2Q. Years-to-quantum. We’re 10 to 15 years from the arrival of quantum computers capable of solving complex problems far beyond the capacity of classical computers to solve. PQC. Post-quantum-cryptography. Right now, the ...
Revitalizing SIEMs by Byron Acohido

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used ...
BEST PRACTICES: 6 physical security measures every company needs

BEST PRACTICES: 6 physical security measures every company needs

It has never been more important to invest in proper security for your business. Laws surrounding the personal data of individuals such as the General Data Protection Regulation (GDPR) put the onus ...
Quelling rekindled BYOD exposures by Byron Acohido

NEW TECH: SyncDog vanquishes BYOD risk by isolating company assets on a secure mobile app

The conundrum companies face with the Bring Your Own Device phenomenon really has not changed much since iPhones and Androids first captured our hearts, minds and souls a decade ago. Related: Malvertising ...
Addressing Active Directory risks by Byron Acohido

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information ...
Addressing third-party cyber risks by Byron Acohido

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through ...
Defusing weaponized emails by Byron Acohido

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

It’s hard to believe this month marks the 20th anniversary of the release of the devastating Melissa email virus which spread around the globe in March 1999. Related: The ‘Golden Age’ of ...
Loading...