Use cases for encrypted drives endure by Byron Acohido

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would ...
Authenticating human and machine identities by Byron Acohido

NEW TECH: Silverfort deploys ‘multi-factor authentication’ to lock down ‘machine identities’

From the start, two-factor authentication, or 2FA, established itself as a simple, effective way to verify identities with more certainty. Related: A primer on IoT security risks The big hitch with 2FA, ...
Here's why APIs present huge, growing cyber risk by Byron Acohido

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their ...
The importance of securing 'machine identities' by Byron Acohido

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

Digital commerce has come to revolve around two types of identities: human and machine. Great effort has gone into protecting the former, and yet human identities continue to get widely abused by ...
The road to eliminating passwords by Byron Acohido

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and ...
A primer on Network Traffic Analysis aka Network Detection and Response by Byron Acohido

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The digital footprints of U.S. consumers’ have long been up for grabs. No one stops the tech giants, media conglomerates and online advertisers from intensively monetizing consumers’ online behaviors, largely without meaningful ...
The role of Cloud Access Security Brokers by Byron Acohido

MY TAKE: CASBs help companies meet ‘shared responsibility’ for complex, rising cloud risks

Cloud Access Security Brokers – aka “caz-bees” — have come a long way in a short time. CASBs, a term coined by tech industry consultancy Gartner, first cropped about seven years ago ...
Why cyber resiliency has become paramount by Byron Acohido

SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

To pay or not to pay? That’s the dilemma hundreds of organizations caught in the continuing surge of crippling ransomware attacks have faced. Related: How ransomware became such a scourge The FBI ...
Deploying human operatives in the Dark Net by Byron Acohido

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and ...
Why quantifying risk should be first and foremost by Byron Acohido

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the ...
Loading...