I recently sat down to speak with Christopher Prewitt, the CTO of Inversion6, a cybersecurity risk management firm that’s close enough to where I live that we could meet for kosher pizza. The first question I asked had to with the company’s name. Inversion6 had gone by MRK Technology for the previous 37 years, only […]
In this thought leader video, Howard Ting, CEO of Cyberhaven, discusses the new Comprehensive Cyber Capabilities Working Group (C3WG), which launched this past June to explore what cybersecurity capabilities are needed to protect the assets of an organization against today’s threats. As Ting describes, data is one of the most important assets and existing models […]
Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers, and the people who manage them, to make code more secure. But, what does it mean for code to be secure? According to Brittany Greenfield, Founder and CEO of Wabbi, application security (AppSec) is different from other […]
By Ray Overby There’s a scene in “Jurassic Park” where a Tyrannosaurus rex chases after Jeff Goldblum and Laura Dern’s characters as they speed through the wildlife park in a Jeep. The camera pans to the car’s side mirror, which reads, “Objects in mirror are closer than they appear” — a minute yet clever […]
Hunter S. Thompson opened his classic political book Fear and Loathing on the Campaign Trail ‘72 with the question, “Is this trip necessary?” Fifty years later, these words were in my head as I landed in San Francisco for RSA 2022. Like Thompson, who reluctantly relocated to a Washington DC riven by crime and toxic […]
Digital Influence Mercenaries: Profits and Power Through Information Warfare by James J. F. Forest (Naval Institute Press) is part of an unintended trilogy of recent books that attempt to explain the current credibility crisis in news and public opinion. Together with Bombarded and Social Engineering, Digital Influence Mercenaries explores the world of stealthy entities that […]
The scourge of ransomware is having an increasingly serious impact on real life. A spate of recent attacks is affecting people and institutions on a scale not previously seen. This week, for example, the nation of Costa Rica announced that its government has effectively been paralyzed by Russian ransomware. Yes, an entire country was shut […]
There’s no doubting that we live in an era unlike any other in human history. Technology has always driven human progress, and our lives almost always change in response to the latest tools we have at our fingertips. However, no other technological innovation has changed humanity so much in so little time as the internet. […]
In my day job as a content writer in enterprise tech and cybersecurity, I often write about the potential of digital transformation (DX). DX is about using the power of digital technology to transform a business, especially its customer and partner relationships, using mobile computing and APIs. One frequently cited example is how a retailer […]
Bombarded: How to Fight Back Against the Online Assault on Democracy, by Cyrus Krohn, with Tom Farmer, takes on an ambitious topic. The authors’ goal is to demonstrate how digital media threatens to destroy American democracy. In particular, they focus on the problem of misinformation and disinformation that floods online news platforms and social media […]
by Mila Bera The digital revolution transformed the dynamics of communication, and several governments responded to these changes by further enhancing their surveillance and detection powers. This paved the way for a surveillance dragnet that’s intercepting massive volumes of online chatter, private emails, and phone calls. These clandestine activities are being spearheaded by a […]
by Steve Freidkin One of the most insidious cybersecurity schemes today, ransomware is projected to have cost over $20 billion in 2021. That number is only expected to multiply in the coming years, so it’s crucial for business owners to guard their organizations against emerging cybersecurity threats and develop thorough mitigation and response plans. Approximately […]
The new book from MIT Press, Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication, by Robert W. Gehl and Sean T. Lawson, takes on an important and ambitious topic. At the risk of oversimplification, Gehl and Lawson set out to answer a question that’s been perplexing thinking, observant […]
By Liam Dorney Reading through the new report Cybersecurity Bills in the 117th Congress from the Cyber Policy Institute, I am struck by the range and scope of legislative activity on this issue. The report reviews the 80 cybersecurity-related bills submitted or passed by the 117th Congress between January 2021 and January 2022. With […]
Our sister organization, The Cyber Policy Institute, just published its first, but hopefully not last report on federal legislation that deals with cybersecurity. The report, Cybersecurity Bills in the 117th Congress, summarizes the 80 bills submitted or passed by the 117th Congress between January 2021 and January 2022. The bills, several of which were included […]
Trust in Computer Systems and the Cloud by Mike Bursell, CEO and co-founder of Profian, takes on a subject of monumental importance in cybersecurity that most of us tend to overlook it on a daily basis. Trust, functioning as a noun and verb, is the root of almost every control and countermeasure in the world […]