Steps forward
STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code
Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics.Everything from science and engineering to poetry and music rely on numeric calculations. Albert ...
SHARED INTEL: Coming soon — ‘passwordless authentication’ as a de facto security practice
bacohido | | Best Practices, For Consumers, For Technologists, My Take, Podcasts, Steps forward, Top Stories
As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication.But now, at long last, we’re on the brink of eliminating passwords altogether, ...
GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases
There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks.Related: Welcome to the CyberXchange MarketplaceIn the U.S. alone, in ...
NEW TECH: Trend Micro flattens cyber risks — from software development to deployment
Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...
MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI
It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.Related: Will ‘blockchain’ lead to more equitable ...
NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures
Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...
MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene
bacohido | | Best Practices, For Consumers, For Technologists, My Take, Privacy, Steps forward, Top Stories
Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level.Related: How the Middle East has advanced mobile security regulationsOver the past couple of decades, ...
BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps
DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of ...
NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks
It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers
It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.Related: The Golden Age of cyber spyingA new ...

