Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized database.
Taylor Armerding |
16 May |
Read more
Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved.
Taylor Armerding |
12 May |
Read more
Not every bank has the money or the staff to do everything on the “best practices” lists of multiple regulatory agencies. But multiple speakers and panelists at the Boston Fed’s 2017 Cybersecurity Conference agreed that most financial institutions, no matter their size, can do the basics.
Taylor Armerding |
03 May |
Read more
Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy.
Taylor Armerding |
02 May |
Read more
Cybersecurity and the future of humanity “are conjoined now,” according to In-Q-Tel’s Dan Geer. The cybersecurity futurist, in the closing keynote at SOURCE Boston 2017, gave a sobering look at what is likely to come in a world where change and growing interdependence is happening faster than anyone’s ability to manage it
Taylor Armerding |
01 May |
Read more
Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.
Taylor Armerding |
28 Apr |
Read more
The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots.
Taylor Armerding |
27 Apr |
Read more
Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.
Taylor Armerding |
27 Apr |
Read more
The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure.
Taylor Armerding |
19 Apr |
Read more
Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.
Taylor Armerding |
12 Apr |
Read more
Robotics is one of the fastest-growing components of the IoT. It can also be one of the more dangerous, if taken over by hackers. And given the level of vulnerabilities in them, that is a clear and present risk.
Taylor Armerding |
07 Apr |
Read more
Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices.
Taylor Armerding |
07 Apr |
Read more
China and the US agreed 18 months ago to stop “knowingly” tolerating economic espionage. According to some studies, the agreement is working. Others aren’t so sure, however.
Taylor Armerding |
30 Mar |
Read more
For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the internet. But other experts say the level of risk, while low, is still unacceptable.
Taylor Armerding |
22 Mar |
Read more
Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print.
Taylor Armerding |
16 Mar |
Read more