Q & A

MY TAKE: Why the next web-delivered ad you encounter could invisibly infect your smartphone

Google, Facebook and Amazon have gotten filthy rich doing one thing extremely well: fixating on every move each one of…

2 years ago

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

Malicious intruders have long recognized that getting their hands on privileged credentials equates to possessing the keys to the kingdom.…

2 years ago

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT…

2 years ago

Port Covington, MD re-emerges as ‘CyberTown, USA’ — ground zero for cybersecurity research

When CyberTown, USA is fully built out, it’s backers envision it emerging as the world’s premier technology hub for cybersecurity…

2 years ago

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

A security-first mindset is beginning to seep into the ground floor of the IT departments of small and mid-sized companies…

2 years ago

Q&A: Reddit breach shows use of ‘SMS 2FA’ won’t stop privileged access pillaging

The recent hack of social media giant Reddit underscores the reality that all too many organizations — even high-visibility ones…

2 years ago

Q&A: The troubling implications of normalizing encryption backdoors — for government use

Should law enforcement and military officials have access to a digital backdoor enabling them to bypass any and all types…

2 years ago

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

Most large enterprises today can point to multi-millions of dollars expended over the past two decades erecting “layered defenses” to…

2 years ago

Q&A: How your typing and screen swiping nuances can verify your identity

The recent data breaches at Timehop and Macy’s are the latest harbingers of what’s in store for companies that fail…

2 years ago

Q&A: Crypto jackers redirect illicit mining ops to bigger targets — company servers

Illicit crypto mining is advancing apace. It was easy to see this coming. It began when threat actors began stealthily…

2 years ago