Why achieving iO -- 'indistinguishability obfuscation' -- is so crucial by Byron Acohido

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics.Everything from science and engineering to poetry and music rely on numeric calculations. Albert ...
The mainstreaming of biometrics-enabled access by Byron Acohido

SHARED INTEL: Coming soon — ‘passwordless authentication’ as a de facto security practice

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication.But now, at long last, we’re on the brink of eliminating passwords altogether, ...
GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks.Related: Welcome to the CyberXchange MarketplaceIn the U.S. alone, in ...
Protecting hybrid cloud networks end-to-end by Byron Acohido

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...
MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.Related: Will ‘blockchain’ lead to more equitable ...
Everything you should know about API exposures by Byron Acohido

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...
MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level.Related: How the Middle East has advanced mobile security regulationsOver the past couple of decades, ...
The case for 'shift left' deep testing in software development by Byron Acohido

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of ...
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
SHARED INTEL:  New book on  cyber warfare foreshadows attacks on elections, remote workers

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.Related: The Golden Age of cyber spyingA new ...