Taylor Armerding

Human weakness enabling financial cybercrime

Human weakness enabling financial cybercrime

Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy.

Dan Geer: Cybersecurity is 'paramount national security risk'

Dan Geer: Cybersecurity is 'paramount national security risk'

Cybersecurity and the future of humanity “are conjoined now,” according to In-Q-Tel’s Dan Geer. The cybersecurity futurist, in the closing keynote at SOURCE Boston 2017, gave a sobering look at what is likely to come in a world where...

Failure to communicate helps ransomware prosper

Failure to communicate helps ransomware prosper

Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.

Present and future ransomware tactics model the past

Present and future ransomware tactics model the past

The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots.

Cyber infrastructure: Too big to fail, and failing

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.

Privacy for everybody means privacy for pedophiles

Privacy for everybody means privacy for pedophiles

The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure.

Can AI and ML slay the healthcare ransomware dragon?

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

Robots: Lots of features, not much security

Robots: Lots of features, not much security

Robotics is one of the fastest-growing components of the IoT. It can also be one of the more dangerous, if taken over by hackers. And given the level of vulnerabilities in them, that is a clear and present risk.

How to securely deploy medical devices

How to securely deploy medical devices

Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices.

IP theft: Declining, or just more stealthy?

IP theft: Declining, or just more stealthy?

China and the US agreed 18 months ago to stop “knowingly” tolerating economic espionage. According to some studies, the agreement is working. Others aren’t so sure, however.

Critical infrastructure: Off the web, out of danger?

Critical infrastructure: Off the web, out of danger?

For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the...

Want good cyber insurance? Read the fine print

Want good cyber insurance? Read the fine print

Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print....

Want to improve risk management? Do the basics

Want to improve risk management? Do the basics

Managing security takes time and focus, but “reasonable” efforts will yield significant results, a cybersecurity panel said Wednesday at Boston College.

Bots: Biggest player on the cybercrime block

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks.

Comey: Strong encryption “shatters” privacy-security bargain

Comey: Strong encryption “shatters” privacy-security bargain

FBI director James Comey told a cybersecurity conference that “absolute privacy” has never been part of the nation’s privacy-security bargain. Ubiquitous strong encryption, he said, “shatters that bargain.”

Will a cyber crisis add to chaos of Trump’s first 100 days?

Will a cyber crisis add to chaos of Trump’s first 100 days?

Forrester Research predicted last fall that the new president would confront a “cyber crisis” within the first 100 days. Experts say that’s an easy call – depending on how you define a crisis.

FDA 'guides' the way to medical device security

FDA 'guides' the way to medical device security

The FDA’s “guidance” documents on medical device security are non-binding. But advocates say they will still have plenty of legal force – especially when it comes to things like insurance or civil suits for damages from insecure...

To pay or not to pay: Too many victims say yes to ransomware

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

Can the FTC save the IoT?

Can the FTC save the IoT?

Enormous amounts of effort, time and money haven’t made much of a dent in the insecurity of the Internet of Things. So, what about making more use of the old-fashioned lawsuit? The Federal Trade Commission is having some impact with...

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security.

Load More