cybersecurity

  • Trump’s wall misses the mark: We need a cyber wall, not a physical one Crunch Network

    Trump’s wall misses the mark: We need a cyber wall, not a physical one

    It’s 2016. There isn’t a wall high enough to keep out the fastest-growing threat to our national security: Cyberterrorism. It follows that our vulnerable corporate networks constitute the border we most urgently need to secure. Read More

  • How do you outsmart malware? Crunch Network

    How do you outsmart malware?

    The growth of data breaches in recent months and years is in large part because of the new generation of smart malware being developed on a daily basis. Malicious actors are constantly taking advantage of technological innovations and breakthroughs to devise new ways to flood the Internet with new malware that circumvent security tools, propagate within networks and siphon critical data for… Read More

  • Demisto emerges from stealth with $6M Series A and smart bot to help automate security ops

    Demisto emerges from stealth with $6M Series A and smart bot to help automate security ops

    Demisto, a company founded by four security industry pros, emerged from stealth today with a pretty cool bot-driven security platform and $6 million in Series A. The round was led by Accel with participation from Cylance CEO Stuart McClure, Lookout CTO Kevin Mahaffey and Bluecoat President Mike Fey, all security industry veterans. What makes all of these companies so interested in Demisto is… Read More

  • Can startups disrupt the $20 billion cyber insurance market? Crunch Network

    Can startups disrupt the $20 billion cyber insurance market?

    Over the past few years, cyber insurance markets have been growing at between 25-50 percent CAGR each year. According to The Betterley Report 2015, annual policy premiums are approaching $2.75 billion. The ecosystem of insurance underwriters, intermediaries/brokers, analysts/management consultants and compilers of insurance market information is evolving rapidly, trying to make the most of… Read More

  • How threat intelligence sharing can help deal with cybersecurity challenges Crunch Network

    How threat intelligence sharing can help deal with cybersecurity challenges

    In the ever-shifting landscape of cyberthreats and attacks, having access to timely information and intelligence is vital and can make a big difference in protecting organizations and firms against data breaches and security incidents. Malicious actors are getting organized, growing smarter and becoming more sophisticated, which effectively makes traditional defense methods and tools… Read More

  • Why incident response plans fail Crunch Network

    Why incident response plans fail

    Following a cyber attack on critical infrastructure, emotions run high and the clock starts ticking. Suddenly what appears to be a well-structured incident response plan on paper can turn into a confusing “storming session” around who owns what. Rather than identifying, analyzing and eradicating the threat, organizations can easily become entangled in processes hindering response… Read More

  • Rethinking security for the Internet of Things Crunch Network

    Rethinking security for the Internet of Things

    Many people scoffed in January 2014 when Cisco CEO John Chambers pegged the “Internet of Everything” as a potential $17 trillion market, five to 10 times more impactful on society than the Internet itself. Two years later, it seems that Chambers’ prediction for the phenomenon more commonly known as the Internet of Things (IoT) could be on the conservative side. Read More

  • The new face of data leaks is fuzzy Crunch Network

    The new face of data leaks is fuzzy

    I dare say that nobody wants to be the target of malicious hackers, and certainly doesn’t want private data out there in the hands of unknown third parties. As individuals, we keep secret our most personal information — bank accounts, passwords and medical information — because we know it can be used against us. We trust organizations to keep this and other personally… Read More

  • Strengthening authentication through big data Crunch Network

    Strengthening authentication through big data

    The fact that plain passwords are no longer safe to protect our digital identities is no secret. For years, the use of two-factor authentication (2FA) and multi-factor authentication (MFA) as a means to ensure online account security and prevent fraud has been a hot topic of discussion. Technological advances, especially in the mobile industry, have created new possibilities, and manufacturers… Read More

  • How IoT security can benefit from machine learning Crunch Network

    How IoT security can benefit from machine learning

    Computers and mobile devices running rich operating systems have a plethora of security solutions and encryption protocols from which to choose that can protect them against the multitude of threats they face as soon as they become connected to the Internet. Such is not the case with IoT. Read More

  • Digital data and the fine line between you and your government Crunch Network

    Digital data and the fine line between you and your government

    What if the government decided they wanted to see what your device could see and hear? Or gain real-time access to the easily digitized information that surrounds a growing crop of connected devices? The Internet of Things (IoT) is producing reams of data about our daily lives — data that could prove incredibly valuable to law enforcement once they figure out a way to harness it. Read More

  • How to deal with the rising threat of ransomware Crunch Network

    How to deal with the rising threat of ransomware

    Of all the money-making schemes hackers employ, the most prevalent is perhaps ransomware, a malware that is usually delivered through infected email attachments and hacked websites or websites featuring ads. Ransomware encrypts files on a user’s computer and renders them unusable until the victim ransoms the key for a specific amount of money. Read More

  • Making sense of enterprise security Crunch Network

    Making sense of enterprise security

    Until recently, I knew nothing about enterprise security beyond some of the more widely-publicized breaches in the United States. That said, after spending most of 2016 immersed in the space, I’ve come to appreciate just how challenging and broad an issue security has become to enterprises. I’ve also come to believe that our best hope for solving security is by understanding… Read More

  • Obama appoints tech veterans from Microsoft and Uber to cybersecurity commission

    Obama appoints tech veterans from Microsoft and Uber to cybersecurity commission

    President Obama has just released the list of appointees to the Commission on Enhancing National Cybersecurity — and it’s more or less what you’d expect: higher-ups from the big players in tech, plus some academics and the former director of the NSA. Wait, what? Read More

  • Interim guidelines to the Cybersecurity Information Sharing Act Crunch Network

    Interim guidelines to the Cybersecurity Information Sharing Act

    Despite the objections of many privacy advocates and security professionals, the Cybersecurity Information Sharing Act (CISA) is now the law of the land. Slipped into the 2016 federal omnibus spending bill, CISA permits private entities to share information about cyberthreat indicators (CTIs) and defensive measures against cyber attacks, both with each other and with the federal government. Read More

  • Hyping vulnerabilities is no longer helping application security awareness Crunch Network

    Hyping vulnerabilities is no longer helping application security awareness

    I fear that overhyping minor vulnerabilities by branding them, pushing the topic with the media and yes, pre-announcing them will cause people to go numb to these announcements. Read More

  • Uncle Sam wants you… to hack the Pentagon Crunch Network

    Uncle Sam wants you… to hack the Pentagon

    My team, the Defense Digital Service (DDS) exists to bring in the best processes, talent, and technology from the private sector into the DoD. An offshoot from the United States Digital Service (USDS) at the White House, we’re tasked with transforming how the Pentagon builds and delivers digital services and products to three million civilian and military employees in the U.S. and around… Read More

  • From the streets to The Street Crunch Network

    From the streets to The Street

    The past several months have brought a string of terror attacks and violent incidents, which not only claim lives but cause worldwide feelings of fear and vulnerability. It seems that groups of terrorists like ISIS can strike when and where they want. As the authorities ramp up surveillance, such attackers simply adapt and change their tactics. They have learned to be patient and to leave… Read More

  • Meeting cybersecurity challenges through gamification Crunch Network

    Meeting cybersecurity challenges through gamification

    When it comes to cybersecurity issues, we always seem to be dealing with either shortages or excess. With the dark shadow of bigger security incidents constantly looming on the horizon, both government agencies and private firms are always looking for new ways to meet the challenges and overcome the many shortages the cybersecurity industry is facing. One of the growing trends in this regard… Read More

  • Software security needs a new perspective Crunch Network

    Software security needs a new perspective

    Source code bugs have been a constant in the software industry since the dawn of computers — and have ever been a major source of attacks, exploits and security incidents. With virtually every aspect of our lives and daily business becoming connected and dependent on software in one way or another, the potential destructiveness of software bugs has become orders of magnitude more… Read More

  1. 1
  2. 2
  3. ...