User-Centric Identity Puts People in Control of Their Online Information

There is an old saying—at least old by technology standards: “On the Internet, nobody knows you’re a dog.” That statement reflects a simple reality of the Internet: anyone can claim to be anything, and anyone can claim to be you. It’s important to protect your online identity and have control over how and where your…

Threat Intelligence Helps You Understand the Big Picture

There is a fundamental flaw with the established model of network and computer security: It’s reactive. Employing threat intelligence to assess and analyze suspicious activity can help you understand the big picture and take action proactively to stay a step ahead of attackers. Imagine if all security worked reactively. How effective would it be if…

Effective Security Starts with Prioritizing Assets

One of the most important jobs of managing servers or maintaining a network is to make sure it is protected from attacks and compromises. If you jump every time a new vulnerability is discovered, though, or if you immediately try to patch everything, all the time, you will be in constant firefighting mode, and you…

Poor Social Network Security Can Put Your Business at Risk

Consider for a minute what information you generally supply when setting up an account, getting a loan, or even ordering a pizza online. Vital information like your name, home address, email address, phone number, and maybe your birth date is commonly required. Now, think about how much of that information an attacker might be able…

Can Security and DevOps Coexist?

DevOps is often a culture of rapid development and frequent rollouts—a culture and mentality that make it very easy to ignore security. All of the traditional challenges of trying to apply security after the fact are exacerbated exponentially in an environment where code is constantly being updated and implemented. So, can security and DevOps coexist?…

Getting Employees Engaged in Cyber-Security Training

It is no secret that no matter how many layers of security you have, or how great your computer and network defenses are, the user is the weak link in the security chain. This being the case, effective training to make users aware of security concerns and security best practices is often a better investment…

Getting Revenge: The Ethics of Active Countermeasures

Businesses and individuals are getting fed up with always being one step behind cyber criminals and constantly playing defense. In an attempt to be more proactive and shift the dynamic, some security experts are now advocating active countermeasures—basically attacking the attackers. While getting revenge has a nice ring to it, becoming an attacker raises a…

Protecting Yourself Against Your Own Users

There is a common thread among many of the major attacks that have occurred in the past couple of years—they were perpetrated either directly or indirectly by someone on the inside. While most of network and computer security is still focused on guarding against external threats, the reality is that privileged users on the inside…

The Creepy Factor of the ‘Internet of Things’

Beneficial technology sometimes has unintended consequences. Sometimes products or services that make life simpler or more convenient also puts us at greater risk. As more devices monitor and track our lives, they also gather copious amounts of personal and sensitive data that could be compromised or exposed. The potential attack surface is exponentially greater when…

Next-generation Attacks Require a New Approach to Cyber Defense

Somehow we managed to establish some sort of security equilibrium for a few years—a status quo where new threats continued to be developed by the millions, but most security tools seemed equipped to detect and block them, and those who followed established security best practices were relatively secure. Then it all changed. Mobile malware, cyber…