Need for mobile security intensifies by Byron Acohido

MY TAKE: Most companies blissfully ignorant of rising attacks on most-used endpoint: mobile devices

A dozen years after Apple launched the first iPhone, igniting the smartphone market, the Bring Your Own Device to work phenomenon is alive and well. Related: Stopping mobile device exploits. The security ...
Small banks, credit unions under attack by Byron Acohido

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and ...
MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

MY TAKE: What ‘fake news’ really is: digital disinformation intended to disrupt, manipulate

President Trump’s constant mislabeling of mainstream news reports he doesn’t appreciate as “fake news” has done much to muddle the accurate definition of this profound global force – and obscure the societal ...
Taking a platform approach to application security by Byron Acohido

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

One way to grasp how digital transformation directly impacts the daily operations of any organization – right at this moment — is to examine the company’s application environment. Related: How new exposures ...
Cloud computing 101: basic types and business advantages of cloud-delivered services

Cloud computing 101: basic types and business advantages of cloud-delivered services

If you are looking for a simpler method of managing issues such as storage, software, servers and database, cloud computing could have the answers that your business needs. The cloud is becoming ...
Addressing third-party cyber risks by Byron Acohido

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through ...
MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web ...
MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

MY TAKE: Here’s why the Internet Society’s new Privacy Code of Conduct deserves wide adoption

When Facebook founder Mark Zuckerberg infamously declared that privacy “is no longer a social norm” in 2010, he was merely parroting a corporate imperative that Google had long since established. That same ...
GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

GUEST ESSAY: Australia’s move compelling VPNs to cooperate with law enforcement is all wrong

The moment we’ve all feared has finally come to pass. When government agencies and international intelligence groups pooled together resources to gather user data, the VPN’s encryption seemed like the light at ...
MY TAKE:  Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be ...
Loading...