Why web application vulnerabilities endure by Byron Acohido

Web application exposures continue to bedevil companies as digital transformation accelerates

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber ...
The case for post-quantum crypto by Byron Acohido

MY TAKE: Get ready to future-proof cybersecurity; the race is on to deliver ‘post-quantum crypto’

| | My Take, Podcasts, Q & A, Top Stories
Y2Q. Years-to-quantum. We’re 10 to 15 years from the arrival of quantum computers capable of solving complex problems far beyond the capacity of classical computers to solve. PQC. Post-quantum-cryptography. Right now, the ...
Revitalizing SIEMs by Byron Acohido

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: How NSA cyber weapon could be used ...
Quelling rekindled BYOD exposures by Byron Acohido

NEW TECH: SyncDog vanquishes BYOD risk by isolating company assets on a secure mobile app

The conundrum companies face with the Bring Your Own Device phenomenon really has not changed much since iPhones and Androids first captured our hearts, minds and souls a decade ago. Related: Malvertising ...
Addressing Active Directory risks by Byron Acohido

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information ...
Addressing third-party cyber risks by Byron Acohido

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

When Target fired both its CEO and CIO in 2014, it was a wake-up call for senior management. The firings came as a result of a massive data breach which routed through ...
Defusing weaponized emails by Byron Acohido

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

It’s hard to believe this month marks the 20th anniversary of the release of the devastating Melissa email virus which spread around the globe in March 1999. Related: The ‘Golden Age’ of ...
Vote Now: 2019 Security Blogger Awards Finalists

Vote Now: 2019 Security Blogger Awards Finalists

As the leaves turn green and the flowers start to bloom in San Francisco, you know what time it is. No, it isn’t hump day; it’s RSA Conference season. And that means ...
Security Boulevard

Inner Circle Podcast Episode 022 – Marcus Carey Chats about ‘Tribe of Hackers’

My guest for this episode of the Inner Circle podcast is Marcus Carey–founder and CEO of Threatcare. Carey is also co-author of the book Tribe of Hackers, which was released just a ...

Inner Circle Podcast Episode 021 – Wendy Nather Talks about the Value of Zero Trust Security

I was honored to have Wendy Nather, head of advisory CISOs for Duo Security–now part of Cisco, join me as my guest for this episode of the Inner Circle podcast. Wendy is ...
Loading...