Security

News, trends and insights for cybersecurity in the digital age

DDoS attacks grow more popular, targeted

several-darts-in-bullseye

A new State of the Internet/Security: Web Attack report finds the number of distributed denial of service attacks to be growing, already up 16 percent over all of last year. The report also found that Russia and China are initiating the most credential-based attacks against the hospitality industry. The report proved records are made to be […]

Evil In = Evil Out: Teaching AI to be bad

drawing-devil-emoji-on-glass

In a recent post I talked about the importance of data quality to machine learning and the effective use of neural networks, which rely on algorithms that process data in order to “learn.” The principal is simple and timeless: Garbage in = garbage out. But there are different types of data garbage. There’s the innocent […]

Changing up security to protect a CPG’s hybrid cloud journey

spelling-change-with-wooden-blocks

Retail and consumer-packaged goods (CPG) companies have been operating in a radically shifting business environment for years. To survive and thrive, they’ve had to embrace new technologies that also are radically changing. Cloud initiatives, for example, are morphing to hybrid approaches that mix on premise, hosted private and public clouds. And that change begets more […]

Four ways security teams sabotage their own efforts

hand-pushing-over-dominoes

There are many reasons why enterprise security teams struggle to succeed in better managing the risks positioned against their data and business-technology systems. Sometimes these obstacles come from elsewhere within the organization, and sometimes they are self-created. At times it’s a lack of serious executive leadership and understanding behind internal cybersecurity efforts. The security program […]

Employees remain obstacle to security

single-hurdle-on-track

Your staff hates security processes. Of course, this isn’t something we didn’t already know. Antivirus software slows down their machines, and remembering zillions of passwords is a hassle. VPN software is often kludgy and most every other security process we ask employees to do gets in the way of their being able to do their […]

Biometrics (finally) gaining widespread acceptance

full-hand-biometric-scanning

It’s time for passwords to die, they said. Passwords are antiquated and don’t provide the level of security needed, they said. This was the marketing mantra of many an authentication and identity management vendor — 20 years ago. Of course, then, passwords were not on their way out. They were still on their way up. […]

Leveraging blockchain features for access restriction in our 3D printing proof-of-concept

When we last talked about our 3D printing procurement system proof-of-concept, we promised to report back on how we are using blockchain features for access restriction. Prior to implementing blockchain features, we handled access restriction to the 3D model files (STL/G-code) using folder access and Enterprise GitHub. This worked fine if the 3D printing was […]

A procrastinator’s guide to GDPR in healthcare

pocket-watch-buried-in-sand

Arguably, not since Y2K has there been such a time-centric frenzy about data risk and liability as we’re seeing with the start date for GDPR in Europe on May 25th. For those unfamiliar with the alphabet soup of the European Community, the General Data Protection Regulation (GDPR) is a directive designed to harmonize data privacy […]

NIST updates cybersecurity framework

cyllindrical-framework

It’s been a long time coming. The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) recently released version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity, or affectionatey called the Cybersecurity Framework. The initial framework was created to help organizations that operate critical infrastructure better secure their digital assets. These industries include energy, […]

The SOC is dead — long live the SOC!

Overwhelmed by existing traffic volumes and held back by a shortage of skilled workers, the average Security Operations Center is approaching a state of crisis – and the challenges will only worsen if SOCs don’t evolve. No doubt about it, the SOC’s mission is vital: detect and respond to all threats. Unfortunately, most SOCs today […]