4 scams that illustrate the one-way authentication problem
These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.
Roger A. Grimes | 26 Jun | Read more
These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.
Roger A. Grimes | 26 Jun | Read more
Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.
Roger A. Grimes | 12 Jun | Read more
Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack
Roger A. Grimes | 26 Apr | Read more
Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand.
Roger A. Grimes | 11 Apr | Read more
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
Roger A. Grimes | 05 Apr | Read more
Want a more effective IT security strategy? Dispel your CEO and senior management of these common cybersecurity misconceptions.
Roger A. Grimes | 26 Mar | Read more
Better security automation at the OS level and via cloud services will force hackers to respond in kind.
Roger A. Grimes | 20 Mar | Read more
Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.
Roger A. Grimes | 14 Mar | Read more
Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance.
Roger A. Grimes | 06 Mar | Read more
Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie.
Roger A. Grimes | 27 Feb | Read more
The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.
Roger A. Grimes | 21 Feb | Read more
Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.
Roger A. Grimes | 13 Feb | Read more
Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.
Roger A. Grimes | 07 Feb | Read more
Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.
Roger A. Grimes | 30 Jan | Read more
Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.
Roger A. Grimes | 23 Jan | Read more