-
Back to the Basics; The Latest CISO Thriller!
We must get back to the basics! Even now we still don’t cover the basics. In many cases, the foundational pieces are not in place, starting with policies and procedures. Any program first needs to set rules of the game, and the world of cybersecurity is no different. We need to establish policies that will…
-
Digital Transformation: the missing link!
Digital transformation is a term bandied about a lot, but it means different things to different people. It’s not a monolithic process. Because digital transformation has become critical for organizations to survive, organizations must clearly know what it means specifically to them and align accordingly. Will the organization move completely to the cloud? Will it…
-
It Strikes Again! The Insidious Reality of Fraud
The ferment in the banking industry touched off by the collapse of Silicon Valley Bank has created opportunities for fraud, as bad actors try to take advantage of the surrounding duress to launch attacks. And artificial intelligence has only made a difficult situation worse. When chaos strikes a financial institution, as it did at SVB,…
-
Generative AI: A Double Edge Sword
Generative AI is a very powerful technology that’s created for constructive purposes, but as with everything else in life, some have found a nefarious way to use it. Bad actors are using these tools to create attacks and circumvent security controls. One AI-generated malware has already been created to evade traditional EDR capabilities. Unfortunately, this…
-
Contending The Digital Surveillance World
The U.S. Supreme Court recently ruled that Meta’s WhatsApp can proceed with its lawsuit against an Israeli technology company it accuses of exploiting a vulnerability in the messaging app to install software to spy on 1,400 of its users, including journalists, rights activists, dissidents and lawyers. The court rejected NSO’s claim that it can’t be…
-
Quantum Computing Is Posing A Perilous Outlook To Security
Chinese researchers claim they have devised a new algorithm that can crack the widely used RSA-2048 encryption key, using a quantum computer that can be built today. Senior security and quantum computing experts have questioned this claim, which defied expectations that the technology to allow this kind of code-breaking was many years away. But the…
-
From Defense to Offense: a new tactical approach
“Defense in depth” is a philosophy that many of us live by, but the time has come for a shift in mindset. Instead of always layering on more and more defenses, I’d like to propose that we go on the offense instead, because we’re obviously not winning the battle. We need to change the strategy…