The Case for Integrating Dark Web Intelligence Into Your Daily Operations
January 30, 2020
Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. That’s why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) employed by threat actors. With that knowledge in hand, decision-makers can better position themselves to protect their organizations.
Tags: Risk Management
3 Steps to Find the Right Digital Transformation Strategy for You
January 17, 2020
You should not feel overly concerned if somebody says “digital transformation” and you are not exactly sure what that means. It’s a phrase that means different things to different people. For some, it might mean cloud migration. For others, it could mean a new set of data and analytics processes being integrated into business operations. And for others, it could simply mean moving completely to the exclusive use of mobile devices to conduct business.
Tags: AI, Cloud, Digital Transformation
How Do We Ensure the Security of What Comes After the 5G Revolution?
January 16, 2020
2020 will see huge investments in 5G networks — Greensill estimated that the 5G rollout throughout the global supply chain will top $2.7 trillion by the end of the year. That’s not a number to sneeze at either, as it’s equal to roughly three percent of the world’s total gross domestic product. And while most of the investment will be in the infrastructure rollout, do not forget the other pieces. Hardware, software and services are also among the necessary investments.
Tags: AI, Cybersecurity, Privacy, Quantum Computing, 5G
About That IoT Device You Received as a Holiday Gift…
December 30, 2019
It is quite possible that you received an internet of things (IoT) device as a holiday gift, and it’s very likely that you will find this holiday gift useful. But it’s also possible you received an additional gift you have no use for at all: security vulnerabilities. This is the inconvenient truth about the average IoT device — like all technologies, it has flaws and it can add to your risk profile.
Tags: AI, IoT, Risk Management
Does Social Media Visualization Serve as a Primer for 5G Data Visualization?
December 01, 2019
The deployment of 5G data technology in our daily lives will be revolutionary, but this blast of speed and data will burden cybersecurity management teams and create an entirely new set of risks to handle around issues such as mobile security and integration with smart cities.
Tags: Big Data, Cybersecurity, Social, 5G
Will the Future of Authentication Run Into a Privacy Wall?
October 16, 2019
Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space.
Tags: AI, Privacy
When Digital Identity and Access Management Meets Physical Security
October 06, 2019
Originally published on IBM's SecurityIntelligence on October 3, 2019
Where does digital security end and tangible, or physical, security begin? In today’s cybersecurity ecosystem, I’d argue that it’s all just security. In fact, if you are handling these domains in discrete silos, your cyber resilience is already taking a hit.
Tags: AI, Cybersecurity, Management, Privacy
What Does Good Cyber Resilience Look Like in 2019?
September 08, 2019
Originally published on IBM's SecurityIntelligence on September 6, 2019
The Greek philosopher Heraclitus of Ephesus once said, “πάντα χωρεῖ καὶ οὐδὲν μένει.” If you’re getting the blue screen feeling, it’s probably because that’s Greek to you. Here’s the translation: “Everything changes and nothing stands still.”
Tags: AI, Cybersecurity
Is Staff Burnout the Best Reason to Implement Cybersecurity AI?
August 18, 2019
Originally published on SecurityIntelligence on August 14th, 2019
Many in the cybersecurity workforce can’t keep up with technological change and are too busy to learn about the latest threats. Some are even so burned out that they are leaving the industry entirely. These are some of the findings of a June 2019 study by Goldsmiths, the University of London and Symantec, the results of which should not only worry those who work in the cybersecurity space, but everyone who relies on a computer to do their work.
If there wa
Tags: AI, Cybersecurity, Emerging Technology, Management
How to Reduce the Risk Posed by Vulnerable Mobile Apps
August 11, 2019
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns nearly 87 percent and iOS owns around 13 percent.
Is It Time to Start Certifying Connected Devices?
July 30, 2019
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure what these markings are, they are almost certainly some type of certification.
Tags: Cybersecurity, IoT
Technology, the Enterprise or the User: Which Owns Mobile Security?
July 03, 2019
It’s not outrageous to suggest that you might be reading this on a mobile device. Nor is it outrageous to think that most people use a mobile device for the majority of their reading these days. I’m even writing this on a mobile device. So for those not following along, at this point, mobile security is really just security. There really isn’t any difference anymore.