For Technologists
DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level
The ubiquity of smart surveillance systems has contributed greatly to public safety. Related: Monetizing data lakes Image capture devices embedded far and wide in public spaces help deter crime as well as ...
GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity
Supply chain security grows more crucial daily as cybercriminals attempt to disrupt distribution and transportation. In response, industry professionals must automate their cybersecurity tools to stay ahead. Why so? The 2020 SolarWinds ...
Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development
Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep
Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. OneRep provides ...
STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?
Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and ...
GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?
Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Related: MSFT CEO calls for regulating facial recognition tech Tesla’s visionary insights from ...
ROUNDTABLE: CISA’s prominent role sharing threat intel could get choked off this weekend
Once again, politicians are playing political football, threatening a fourth partial government shutdown in a decade. Related: Biden’s cybersecurity strategy As this political theater runs its course one of the many things ...
Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount
APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...
BREAKING NEWS Q&A: What Cisco’s $28 billion buyout of Splunk foretells about cybersecurity
There’s a tiny bit more to Cisco’s acquisition of Splunk than just a lumbering hardware giant striving to secure a firmer foothold in the software business. Related: Why ‘observability’ is rising to ...
GUEST ESSAY: Caring criminals — why some ransomware gangs now avoid targeting hospitals
Ransomware is a significant threat to businesses worldwide. There are many gangs that work together to orchestrate increasingly damaging attacks. However, some of these groups follow codes of conduct that prevent them ...