Cybersecurity Matters

George Hulme lends his expert insight into the latest developments in cybersecurity

Five technology and security books I’m reading to start the new year

wall-of-books

Trying to keep up on the latest technology and security developments is never-ending. The number of articles, expert interviews, books, blogs, videos, presentations, podcasts, and documentaries we need to watch to keep up also seems endless. Still, there’s nothing like a good book for an expert deep dive on a topic, which is why I […]

Be aware: Connected toy security and privacy risks have arrived this holiday

shady-robot

Internet-connected toys are popular – and your children may have received some over the holidays, but are you aware of the security risks? We know that IoT devices are notoriously insecure. Too often they are difficult to update when security vulnerabilities are uncovered — if users are notified of updates at all. The problem with […]

Is GDPR fueling identity management investments?

fingerprints

It’s one of the oldest disciplines in cybersecurity, and to this day it still remains one of the most important. This is why it didn’t surprise me to see a recent analyst report estimating that the identity and access management market is expected to reach about $20 billion by 2023, up from $7.8 billion in […]

The state of healthcare security spending

security-screen

This year has been a big year for healthcare security – and not all in a good way. Through September of this year, according to the U.S Department of Health and Human Services Office for Civil Rights (OCR) website, nearly 5 million healthcare records have been exposed so far this year. And that’s only counting […]

GDPR compliance not so costly for big firms

Euros-magnifying-glass

While the fines may be punitive and costly, the cost of becoming GDPR compliant may not be all that steep for large companies, at least according to a recent survey by the law firm Paul Hastings LLP. Paul Hastings surveyed 100 general counsels and chief security officers at the FTSE 350 and 100 general counsels […]

Despite digital transformation efforts, federal agencies yet to fully embrace identity management

keyboard-thumbprint

Enterprises in the private sector have undergone tremendous change in recent years — end user mobility, cloud, shadow IT, and substantial digital transformation — and federal departments and agencies have been no different. In the past few years e-government efforts have digitized and automated many ways citizens interact with local, state, and federal government.  Of […]

Successfully defending against social engineering attacks

helmet-and-shield-armor

While it’s the technical aspects of cyberattacks that often make headlines — software exploits, worms, ransomware, and other forms of malware — it’s actually the subversion of people (end users) that make many, if not most attacks today, successful. All attacks eventually involve technical aspects, but it’s the trickery to get someone to click on […]

National Science Foundation funds additional cybersecurity research

empty-notebook-on-computer-desk

One might think that, since the dawn of the network firewall and intrusion detection systems in the 1980s, the tech industry would have a handle on the technologies necessary to adequately secure networks, applications, data, and people. Looking at the state of security and endless data breach story headlines, however, and it’s safe to assume […]

GDPR raising cybersecurity awareness among EU business leaders

EU-flag

As if the daily beating of data breach news wasn’t enough reason to bring the stark reality of cyber risks to the attention of corporate leaders, here comes the European Union’s General Data Protection Regulation (GDPR). Taking effect in May 2018, GDPR is managing to elevate cyber risks to the top of the corporate agenda […]

Not all cyberattacks are over data theft

locked-gate

When executives consider the risk to their systems they often consider only the value of their data and that of their customers. Too rarely do they consider the intrinsic value of their raw computing power or how their computing systems could be used as part of a larger attack. Case in point, last week security […]