Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.
It’s smart t
Mark your calendars. The HMG Live! Silicon Valley CISO Virtual Summit, on Aug 25th 10am Pacific, is a conference for #cybersecurity professionals interested in the latest perspectives on the shifting risks and opportunities of future business.
The first warning sign was “hackproof” in the 360Lock marketing materials. As it turns out, with no surprise to any security professional, the NFC and Bluetooth enabled padlock proved to be anything but secure.
I am seeing many security vendors developing products to unify solutions into a single management interface. I fear this is just a sales tactic to gain greater market share and not intended to help the plight of CISO’s
A recent article from ComputerWe
Fear, one of the most powerful drivers of all time. Movies, novels, companies, even I had the unfortunate chance to hear the following phrase directed to a coworker: " I can replace you with a script and I will save money".
Automation is the new catc
It simply makes no sense to call for IoT devices to be certified safe-and-secure. Before you get bent out of shape, hear me out.
Regulations are unwieldy blunt instruments, best left as a last resort. Cybersecurity regulations are not nimble, tend
Why is the Sacramento region ripe for innovation in Cybersecurity?
Come join the online Sacramento Urban Technology Lab conference where a panel including Malcolm Harkins, Kimberley Owen, George Usi, Carmen Marsh, and myself will discuss why Sac is a
Recent verified reports highlight exploitable vulnerabilities in Apple’s security chip that cannot be patched! The announcement adds to the growing concerns and shifting perceptions about hardware security.
Hardware-based security has pros and cons.
The U.S. National Security Agency knows which vulnerabilities China backed hackers are exploiting the most to gain access to sensitive data.
The Chinese state-sponsored information gathering engine is a vacuum when it comes to acquiring information fr
October is Cybersecurity Awareness Month. It is a time to consider the risks we accept everyday when using computers and what we can do to better protect ourselves.
I have a challenge for each and every person. Something that will help people indiv
Register here. Friday Oct 30th 9am-5:30pm PST
Raj Samani is the keynote - a can’t-miss speaker who is always informative and entertaining. The talks will cover a wide range and depth
A group of security vulnerability researchers, after many months of work, were able to figure out the update process and secret key used to decrypt Intel microcode updates for the Goldmont architecture product lines.
This is an important finding as it
The process of digitizing industrial operations does not only relate to the traditional entities of IT infrastructure. It also plays a role in the area of the Industrial Internet of Things (IIoT), whose components used to be virtually unreachable fo
Originally posted at Anton on Security.
Back in August, we released our first Google/Chronicle — Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” (launch blog, paper PDF) and promise
In the aftermath of WhatsApp’s privacy notification to users, that they will again be sharing data with Facebook, there is still a lack of clarity. I see a lot of statements from WhatsApp and general chatter regarding what data they will NOT be shar
The recent attempt by malicious hackers to poison a Florida city water supply, highlights the public risks and exposure of critical infrastructures. Luckily, this incident was detected by an observant technician and mitigated before people were hurt
It appears France is the main victim for this recent attack which has several uncanny similarities to the SolarWinds exploitation that exposed thousands of U.S. government agencies, critical infrastructure organizations, and major businesses. Let me
I am looking forward to participating in the technology panel at the upcoming SecurityNext conference (Feb 24-25, virtual). Artificial Intelligence is accelerating and will play a growing role in security services and emerging capabilities. I expec
This article gives a 5 principal steps and questions one must solicit the emergency from the cyber security incident response steps. This includes the incident, the control points, plan of action, communication, business impacts.
( Read More: Incide
Note: this page contains paid content.
Please, subscribe to get an access.
- Develop a comprehensive, defensive security posture to protect against ransomware
- Tools to discover and monitor attack surface to identify the entry points of attackers
- Designing a cyber resilience program and incident response program
- Created by: pritha
- Prevent, Detect And Recover From Ransomware Attacks
- Data Protection Strategy
- Created by: pritha