Security

News, trends and insights for cybersecurity in the digital age

Progress for cloud-enabled robots

robot-dog

Robots have become smart, but when you use cloud resources to run them, they can become even smarter – and faster. While cloud-enabled robotics has been around in some form since 2011, some companies have recently taken the field from theory to practice. PerceptIn, for example, is prepping cutting-edge surveillance robots that incorporate proprietary object-recognition […]

5 tips to better detect and respond to advanced endpoint threats

intruder

Endpoint threats are growing more sophisticated and targeted, as hackers come up with new attack techniques and tailor hacking tactics to their specific targets. Recently, ransomware attacks such as WannaCry and Petya compromised hundreds of thousands of end-user devices, leaving IT departments scrambling to resolve the outbreaks without good visibility or control of their endpoints. […]

What’s your cyber risk appetite?

How much cyber risk is your organization willing to take on? Knowing this “risk appetite” is an important element in the pace of the digitization of your organization. Cyber resilience is the ability of your enterprise to keep its transformed business models efficient and effective in the face of increased IT system threats from nation […]

Despite digital transformation efforts, federal agencies yet to fully embrace identity management

keyboard-thumbprint

Enterprises in the private sector have undergone tremendous change in recent years — end user mobility, cloud, shadow IT, and substantial digital transformation — and federal departments and agencies have been no different. In the past few years e-government efforts have digitized and automated many ways citizens interact with local, state, and federal government.  Of […]

6 technology trends for 2018: Guideposts for digital transformation

‘Tis always the season for continuous innovation. As we look ahead to 2018, we see six big trends feeding the next wave of disruption and productivity. And that means opportunity for the digital enterprise. 1. Re-platforming the enterprise In 2018, companies will move to common IT platforms so they can respond to market changes faster […]

How serverless computing serves the enterprise

Savvy businesses crave rapid iterative development, reduced IT costs, and strategic use of IT staff for creating differentiated services, not for provisioning and managing back-end compute resources. The answer? Serverless computing. Serverless computing, an emerging style of application development, eliminates the complexity of dealing with servers at all levels of the technology stack. It provides […]

Successfully defending against social engineering attacks

helmet-and-shield-armor

While it’s the technical aspects of cyberattacks that often make headlines — software exploits, worms, ransomware, and other forms of malware — it’s actually the subversion of people (end users) that make many, if not most attacks today, successful. All attacks eventually involve technical aspects, but it’s the trickery to get someone to click on […]

National Science Foundation funds additional cybersecurity research

empty-notebook-on-computer-desk

One might think that, since the dawn of the network firewall and intrusion detection systems in the 1980s, the tech industry would have a handle on the technologies necessary to adequately secure networks, applications, data, and people. Looking at the state of security and endless data breach story headlines, however, and it’s safe to assume […]

The case for security breach communications in healthcare

medical-equipment

My research and writing embeds me in a world of frighteningly smart healthcare security professionals. At a recent HIMSS cybersecurity conference, I sat horrified to learn how complicated the challenges of protecting healthcare records really are. I also learned that even the most complex security firewalls like Blockchain are still untested over long periods of […]

Some random (yet compelling) sound bytes from healthcare pros

woodtype

One of the occupational hazards of blogging is the need to confine one’s writing to a specific theme and come up with 500 pithy words to reinforce the premise. But we all have some weeks where there is a wide variety of unstructured insight from a variety of sources, but with little connective tissue other […]