SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect. Related: Privacy rules for vehicles As vehicles continue to offer modern features such as app-to-car ...
MY TAKE: Putin’s  weaponizing of ransomware shows why network security needs an overhaul

MY TAKE: Putin’s weaponizing of ransomware shows why network security needs an overhaul

At 10 am PDT, next Wednesday, April 19th,  I’ll have the privilege of appearing as a special guest panelist and spotlight speaker on Virtual Guardian’s monthly Behind the Shield cybersecurity podcast. Related: ...
GUEST ESSAY: The common thread between China’s spy balloons and Congress banning Tik Tok

GUEST ESSAY: The common thread between China’s spy balloons and Congress banning Tik Tok

The decision by the House of Representatives to ban  TikTok  from federal devices is noteworthy, especially as the Chinese spy balloon crisis unfolds. Related: The Golden Age of cyber espionage On December ...
GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity

GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity

Over the years, bad actors have started getting more creative with their methods of attack – from pretending to be a family member or co-worker to offering fortunes and free cruises. Related: ...
GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping

GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping

More and more consumers are using apps every year. In fact, Google Play users downloaded 111.3 billion apps in 2021 alone, up more than 47 percent since 2018. Related: Microsoft CEO calls ...
GUEST ESSAY: Why Microsoft Exchange users ‘must have’ robust data recovery policies, practices

GUEST ESSAY: Why Microsoft Exchange users ‘must have’ robust data recovery policies, practices

Cloud hosted email services have come into wide use as the go-to communication and collaboration work tools for businesses far and wide. Related: Weaponized email endures as top threat Digital native companies ...
SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022

SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022

As we close out 2021, a gargantuan open-source vulnerability has reared its ugly head. Related: The case for ‘SBOM’ This flaw in the Apache Log4J logging library is already being aggressively probed ...
GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

Mental health at work is undergoing a rapid transformation. Even before the COVID-19 pandemic, which has caused an increase in feelings of loneliness and isolation, workers’ mental health was under pressure. Related: ...
MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall

MY TAKE: For better or worse, machine-to-machine code connections now form much of the castle wall

Managing permissions is proving to be a huge security blind spot for many companies. Related: President Biden’s cybersecurity order sets the stage What’s happening is that businesses are scaling up their adoption ...
GUEST ESSAY: Here’s what every business should know — and do — about CaaS: crime-as-a-service

GUEST ESSAY: Here’s what every business should know — and do — about CaaS: crime-as-a-service

It doesn’t matter if you want to learn a new language or figure out how to fix your broken clothes dryer; the tools, tutorials, and templates you need are available online. Related: ...