Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity

Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity

There’s no denying that castle walls play a prominent role in the histories of both military defense, going back thousands of years, and — as of the start of the current millennia ...
DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

To sell us more goods and services, the algorithms of Google, Facebook and Amazon exhaustively parse our digital footprints. Related: The role of ‘attribute based encryption’ There’s nothing intrinsically wrong with companies ...
News alert: Deloitte, Memcyco partner to deliver real-time ‘digital impersonation’ solutions

News alert: Deloitte, Memcyco partner to deliver real-time ‘digital impersonation’ solutions

| | For Technologists, Top Stories
New York, NY, Jan. 22, 2024 —  Memcyco Inc, the real-time digital impersonation detection and prevention solution provider, and Deloitte, the leading consulting, advisory, and audit services firm, today announced their strategic ...
TITAN RAIN: How Chinese Cybercriminals Infiltrated The United States Cyberspace

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

Russia’s asymmetrical cyber-attacks have been a well-documented, rising global concern for most of the 2000s. Related: Cybersecurity takeaways of 2023 I recently visited with Mihoko Matsubara, Chief Cybersecurity Strategist at NTT to ...
LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

Here’s the final installment of leading technologists sharing their observations about cybersecurity developments in the year that’s coming to a close — and the year to come. Last Watchdog posed two questions: ...
The AI revolution: Google's developers on the future of artificial intelligence | 60 Minutes

MY TAKE: Fostering Digital Trust – the role of ‘post-quantum crypto’ and ‘crypto agility’ in 2024

Notable progress was made in 2023 in the quest to elevate Digital Trust. Related: Why IoT standards matter Digital Trust refers to the level of confidence both businesses and consumers hold in ...
LW ROUNDTABLE:  Cybersecurity takeaways of  2023 — and what’s ahead in 2024 ( part 1)

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up, just as they have, year-to-year, for the past 20 years. Related: Adopting an ...
Taking a joint task force approach to cybersecurity

MY TAKE: Sophos X-Ops advances internal, external threat intelligence sharing to the next level

Threat intelligence sharing has come a long way since Valentine’s Day 2015. Related: How ‘Internet Access Brokers’ fuel ransomware I happened to be in the audience at Stanford University when President Obama ...
Solving & Innovating at DigiCert Trust Summit 2023

MY TAKE: New tech standards, like ‘Matter’ and ‘BIMI,’ point the way to secure interoperability

The IQ of our smart homes is about to level-up. Hundreds of different types of smart devices designed to automate tasks and route control to our smart phones and wearable devices have ...
GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

GUEST ESSAY: The many channels law enforcement pursues to mitigate cyber threats

Throughout 2023, we’ve witnessed numerous significant cyber incidents. One of the largest this year was the MOVEit breach, which impacted various state motor vehicle organizations and exposed driver’s license information for nearly ...

Secure Guardrails