Q & A - Tagged - Security Boulevard
SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

Human suffering and economic losses weren’t the only two things that escalated with the spread of Covid 19 last year. Related: Can ‘SASE’ help companies secure connectivity? Network breaches also increased steadily ...
Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives ...
Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Cloud migration, obviously, is here to stay.Related: Threat actors add ‘human touch’ to hacksTo be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. But there’s no doubt that the ...
Q&A:  NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Enterprise risk management (ERM) is a comparatively new corporate discipline. The basic notion is that in today’s complex operating environment, it is important for businesses to proactively identify operational hazards and have ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
'Automated active' attacks explained by Byron Acohido

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on ...
The rise of machine identities by Byron Acohido

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the ...
Q&A: How AI, digital transformation are shaking up revenue management in high tech,  life sciences

Q&A: How AI, digital transformation are shaking up revenue management in high tech, life sciences

A recent poll of some 300 senior executives from U.S.-based life sciences and high-tech manufacturing companies sheds light on how digital transformation – and the rising role of third-party partners – have ...
Simplifying enterprise security decisions by Byron Acohido

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The ...
Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

| | Q & A, Top Stories
A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities When antivirus (AV) software first arrived in the late 1980s, the science of combating ...