Q&A: Here’s how the ‘Matter’ protocol will soon reduce vulnerabilities in smart home devices

Q&A: Here’s how the ‘Matter’ protocol will soon reduce vulnerabilities in smart home devices

After years of competitive jockeying, the leading tech giants have agreed to embrace a brand new open-source standard – called Matter – that will allow consumers to mix and match smart home ...
Q&A: Here’s why VPNs are likely to  remain a valuable DIY security tool for consumers, SMBs

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

It is astounding that billions of online accounts have been breached over the past 18 years and that US consumer accounts are by far the most compromised. Related: VPNs vs ZTNA Now ...
Q&A:  The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

During the first two decades of this century, virtual private networks —VPNs—served as a cornerstone of network security. Related: Deploying human sensors VPNs encrypt data streams and protect endpoints from unauthorized access, ...
SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

Human suffering and economic losses weren’t the only two things that escalated with the spread of Covid 19 last year. Related: Can ‘SASE’ help companies secure connectivity? Network breaches also increased steadily ...
Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Q&A: Here’s why securing mobile apps is an essential key to tempering political division

Finally, Facebook and Twitter muzzled Donald Trump, preventing him from using his favorite online bully pulpits to spread disinformation. It only took Trump inciting a failed coup d’état that cost five lives ...
Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

Cloud migration, obviously, is here to stay.Related: Threat actors add ‘human touch’ to hacksTo be sure, enterprises continue to rely heavily on their legacy, on-premises datacenters. But there’s no doubt that the ...
Q&A:  NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

Enterprise risk management (ERM) is a comparatively new corporate discipline. The basic notion is that in today’s complex operating environment, it is important for businesses to proactively identify operational hazards and have ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
'Automated active' attacks explained by Byron Acohido

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on ...
The rise of machine identities by Byron Acohido

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

It’s edifying what you can find shopping in the nether reaches of the dark web. Related: Why government encryption backdoors should never be normalized. Academic researchers from Georgia State University in the ...