Nothing is secure, your calls aren't private and your car could kill you
BlackBerry remains the only mobile vendor that places enterprises first and doesn't rank them someplace after the casual game developers. At its enterprise security briefing in New York this week,...
View ArticleDon’t count on people to prevent data breaches
Your company has been breached and your executives are in denial.That is the phrase that came to mind the other day during breakfast at RSA with Intel’s security organization where I overheard the...
View ArticleWhy you shouldn’t trust cloud service providers
Simply stated, you can’t trust the employees of cloud service providers. Frankly, I don’t think we can really trust our own employees anymore either, but at least our capability to monitor them is far...
View ArticleHow to fight back against reputation damaging Internet monsters
About 10 years ago I started watching an ugly trend with regard to identity theft. So I started looking into firms that could defend against these attacks. I think those that steal identities and...
View ArticleBattling cyberattacks with bombs?
While hosting a panel on security this week, I talked to Johnathan Nguyen. Nguyen is in charge of the Data Breach Investigation Report at Verizon. He came out of government to focus on enterprise...
View ArticleBelgium attacks reinforce that security is everybody’s problem
I’ve had some rather unusual security training over the years. One of my earliest jobs was in security and law enforcement, and my course of study in graduate and undergraduate school included...
View ArticleNew IoT security certification aims to make the world safer
If Underwriters Laboratories (UL) fills a security certification gap, will anyone care? This is often the problem for a product or service that has been well-established. If it branches out into a new...
View ArticleWhy the NSA should be considered a hostile agency
This last week we had yet another NSA event. This time it was the leak of advanced tools that could be used to exploit unreported defects in networking gear from U.S. manufacturers. This seems to...
View ArticleHow analytics can protect you from Amy Schumer (malware)
This was interesting in so many ways, this week McAfee issued a report showing how malware delivery using compromised websites and gaming Google search analytics has suddenly become a lot smarter....
View ArticleHow San Diego’s CISO battles cyberthreats
Things are getting ugly out there. I had a chance this week to chat with Gary Hayslip who is the first CISO for the City of San Diego. He also co-authored the book the “CISO Desk Reference Guide”...
View Article
More Pages to Explore .....