Michael Lynch Chief Strategy Officer, InAuth, | 12/6/2017
Every holiday season, the use of automated bots to grab the hottest toys, electronics and other items en masse aggravates shoppers and retailers alike. These sophisticated bots are able to make legitimate purchases of high demand, limited quality items at superhuman speed. In turn, the items purchased are then resold for a premium (sometimes exorbitant) ...
Scott Ferguson Editor, Enterprise Cloud, | 12/5/2017
A group of international law enforcement agencies, including the FBI, are claiming a victory over the massive Andromeda botnet, which infected at least 1 million PCs each month and spawned a wave of malware families.
Joe Stanganelli Principal, Beacon Hill Law, | 11/30/2017
"The Internet of Things leads also to the Internet of Threats because, obviously, every device that has [connectivity to] the Internet built into it becomes subject to hacking; that's just the bottom line," said US Senator Edward Markey (D-Mass.) in a Senate Subcommittee hearing last year. "If you don't deal with the threats, then all you are doing is ...
Simon Marshall Technology Journalist, | 11/10/2017
In April 2007, Estonia relocated the Bronze Soldier of Tallinn (or, 'Alyosha'), a World War Two monument dedicated to the Red Army. This event caused a military build-up on the border from the Russian Federation, and two nights of rioting. The ripple effect from a giant cyber-attack timed for these events are still being felt by today's cybersecurity ...
Security teams are over-stretched. It's no secret. The diversity and explosion in threats versus the skills shortage are making everyone sweat. The noise from threat warnings is increasing, prioritization is a struggle and sometimes knowledge and experience get lost along the way.
Most companies and individuals in the developed world have very little knowledge of advanced military tactics. We don't need that knowledge in our daily lives. The rise in state-sponsored cyber crime is changing the calculus when it comes to knowing advanced hacking techniques. And most of us have a lot to learn.