Opinions

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

4 silent skeptic

Silence is not golden

How a mismanaged incident response could cost Google more than a social network.

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

facebook portal

Facebook wants you to put a Portal camera and microphone in your home

Facebook's Portal camera doesn't have end-to-end encryption, which could make it handy for police to tap your video calls.

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

login password - user permissions - administrative control

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know.

medical network h/ ealthcare IoT / hospital connections and communications

Securing connected medical devices: Will categorizing them as ICS help?

Now that they’re no longer protected by an “air gap,” let’s consider what’s needed to protect connected medical devices from security threats.

monitoring systems

Will your company be valued by its price-to-data ratio?

The job of every security professional is to protect their organization’s price-to-data ratio. In the past, it was typically the Sales and Marketing teams in the hot seat driving a company’s valuation by maintaining sales goals to...

keys authentication

What is the future of authentication? Hint: It’s not passwords, passphrases or MFA

Passphrases and MFA are not password saviors. Ultimately, authentication will rely on algorithms to determine user identity and detect fraudulent actions.

Chrome browser logos

Google Chrome 70 is coming. Are your security certificates in order?

All Symantec-issued digital certificates will be deprecated on Google Chrome by mid-October. Former Symantec customers must ensure their websites are compliant.

binary rain / cloud / data / information / internet of things

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

smarthome security

The home analogy – security redefined for the hybrid world

What we can learn from our home security evolution in our cloud security journey.

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

russian hacking us election  putin voting fraud hacked

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

controling it costs

The potential costs of cybercrime that can’t be calculated

Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our...

candle laptop blackout

What hurricane preparedness teaches us about resilience

Applying five FEMA best practices to your incident response planning

Linux security

Linus Torvalds, the UNIX Wars and history repeating itself

Linus Torvalds, the creator and maintainer of the Linux Kernel, announced on a mailing list that he was taking time off to address behavioral issues that have caused negativity in the Linux community. This presented business risk and...

02 clicker

Reconciling information security and shrink-wrap agreements

Addressing the security risks that come with non-negotiable shrink-wrap (or click-wrap) agreements.

Load More