cybersecurity
U.S.: Cybersecurity Must Go Beyond Passwords
If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article
Covering Your Assets: Blockchain and Security
The combined market value of blockchain-based technologies, such as cryptocurrencies, is measured in the billions of US dollars. With cryptocurrency gaining legitimacy, it’s worth knowing what security measures are ...Full Article
Machine Learning and Online Security in 2017
As companies increase their digital footprints, ‘identify and diagnose’ capabilities will not defend against the growing array of security threats, according to analysts at Gartner Group. Because the types ...Full Article
How Retailers Can Fend Off FlokiBot Malware
The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase in security threats. While many are concerned with online shopping, in-store retail ...Full Article
The New Cyber Security Minefield: A Proactive, Not Reactive, Approach
In 2016, the cyber landscape shifted dramatically – at least on the adversary side. In the last few months alone, we’ve seen hackers penetrate organizations from the DNC to ...Full Article
Cybersecurity Merger Combines Spycraft, Data
Aiming to augment its virtualized platform for cyber defense with what it calls an "intelligence-led approach" to cyber security, FireEye Inc. has completed its acquisition of privately-held iSight Partners, ...Full Article
IronNet, Founded by Ex-NSA Boss, Gains Funding
A cybersecurity startup with a wealth of insider knowledge and a plan to leverage high-performance computing along with advanced visualization techniques has attracted the attention of well-known investors. IronNet ...Full Article
What Will We Do About the Cybersecurity Pearl Harbor?
When I first started to equate the massive and consequential breaches suffered during the recent past with multiple Pearl Harbors, a few people thought I was over dramatic and ...Full Article
Data Theft: It’s Not the Only Danger Hackers Wreak
By manipulating or changing data, hackers can alter medical or financial records and put enterprises -- or even lives -- in danger. Tools like threat modeling allay these concerns, ...Full Article
Data Surveillance: Because “Data is Where the Money Is”
Infamous felon Willie Sutton robbed his first bank in 1927 and went on to make illegitimate withdrawals of millions of dollars from some dozens of banks over two decades. Sutton ...Full Article