GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

Throughout 2023, we’ve witnessed numerous significant cyber incidents. One of the largest this year was the MOVEit breach, which impacted various state motor vehicle organizations and exposed driver’s license information for nearly ...
GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

Cisco’s $28 billion acquisition of Splunk comes at an inflection point of security teams beginning to adopt to working with modern, cloud-native data lakes. Related: Dasera launches new Snowflake platform For years, ...
GUEST ESSAY:  A primer on best practices for automating supply chain cybersecurity

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds ...
SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides ...
GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Related: MSFT CEO calls for regulating facial recognition tech Tesla’s visionary insights from ...
ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

Once again, politicians are playing political football, threatening a fourth partial government shutdown in a decade. Related: Biden’s cybersecurity strategy As this political theater runs its course one of the many things ...
GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them ...
GUEST ESSAY: The timing is ripe to instill trust in the open Internet — and why this must get done

GUEST ESSAY: The timing is ripe to instill trust in the open Internet — and why this must get done

In today’s digital age, trust has become a cornerstone of building a better Internet. Preserving privacy for a greater good The Internet was designed as a platform for peer research, not for ...
GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

GUEST ESSAY: Robust data management can prevent theft, guard intellectual property

In an era of global economic uncertainty, fraud levels tend to surge, bringing to light the critical issue of intellectual property (IP) theft. Related: Neutralizing insider threats This pervasive problem extends beyond ...
GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security

GUEST ESSAY: Securing your cryptocurrency — best practices for Bitcoin wallet security

Over time, Bitcoin has become the most widely used cryptocurrency in the world. Strong security measures become increasingly important as more people use this digital currency. Related: Currency exchange security issues For ...