DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The ubiquity of smart surveillance systems has contributed greatly to public safety. Related: Monetizing data lakes Image capture devices embedded far and wide in public spaces help deter crime as well as ...
GUEST ESSAY:  A primer on best practices for automating supply chain cybersecurity

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds ...
How 'clean code' reinforces DevOps, CI/CD by Byron Acohido

Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides ...
STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and ...
GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Related: MSFT CEO calls for regulating facial recognition tech Tesla’s visionary insights from ...
ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend

Once again, politicians are playing political football, threatening a fourth partial government shutdown in a decade. Related: Biden’s cybersecurity strategy As this political theater runs its course one of the many things ...
The inevitable rise of robust API security by Byron Acohido

Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount

APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...
BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity

BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity

| | For Technologists, Q & A, Top Stories
There’s a tiny bit more to Cisco’s acquisition of Splunk than just a lumbering hardware giant striving to secure a firmer foothold in the software business. Related: Why ‘observability’ is rising to ...
GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals

Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them ...