The rise of machine identities by Byron Acohido

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the ...
Q&A: How AI, digital transformation are shaking up revenue management in high tech,  life sciences

Q&A: How AI, digital transformation are shaking up revenue management in high tech, life sciences

A recent poll of some 300 senior executives from U.S.-based life sciences and high-tech manufacturing companies sheds light on how digital transformation – and the rising role of third-party partners – have ...
Simplifying enterprise security decisions by Byron Acohido

Q&A: How cutting out buzzwords could actually ease implementation of powerful security tools

The central dilemma posed by digital transformation is this: How do companies reap the benefits of high-velocity software development without creating onerous security exposures? Related: Golden Age of cyber spying dawns The ...
Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

Q&A: How cybersecurity has become a primal battleground for AI one-upsmanship

| | Q & A, Top Stories
A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities When antivirus (AV) software first arrived in the late 1980s, the science of combating ...
The case for post-quantum crypto by Byron Acohido

MY TAKE: Get ready to future-proof cybersecurity; the race is on to deliver ‘post-quantum crypto’

| | My Take, Podcasts, Q & A, Top Stories
Y2Q. Years-to-quantum. We’re 10 to 15 years from the arrival of quantum computers capable of solving complex problems far beyond the capacity of classical computers to solve. PQC. Post-quantum-cryptography. Right now, the ...
Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

There’s a frantic scramble going on among those responsible for network security at organizations across all sectors. Related: Why we’re in the Golden Age of cyber espionage Enterprises have dumped small fortunes ...
MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of us makes when we use our Internet-connected computing devices. Related: Protecting web ...
Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom. This is because privileged accounts are widely deployed all across modern business ...
Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated ...
Port Covington, MD re-emerges as  ‘CyberTown, USA’ — ground zero for cybersecurity research

Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

| | Q & A, Top Stories
When CyberTown, USA is fully built out, it’s backers envision it emerging as the world’s premier technology hub for cybersecurity and data science. DataTribe, a Fulton, MD-based cybersecurity startup incubator, has been ...
Loading...