Fake news, fake accounts - even fake food. Gartner analyst Avivah Litan is concerned about the onslaught of "fake everything" and how it undermines the trust upon which enterprises are built. In this 2020 preview, Litan discusses emerging technologies to combat the fakes.
While run-of-the-mill ransomware attacks continue, some crypto-locking malware gangs are bringing more advanced hacking skills to bear against targets, seeking the maximum possible payout, says cybersecurity expert Jake Williams of Rendition Infosec, who dubs the trend "ransomware 2.0."
Shifting demographics and digital transformation drive the risk associated with today's dynamic workforce.Gallup estimates nearly one in three U.S. workers already participate in the gig economy in some capacity. They create a revolving door of joiners, movers and leavers for IT and IAM teams to manage and they...
In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps.
Encrypted chat and messaging application Keybase has found out what happens when you wrap a cryptocurrency giveaway into your service. In short: Everyone comes out the woodwork to try to get a slice of the pie.
Just by using the term "artificial intelligence," we're already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having? Calvert discusses the proper balance of humans and machines.
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's...
DevOps started in 2009 and over a decade later we are still stuck in the DEVops phase. Will 2020 be the year of true DevOps, and will 2021 be the year of DevSecOps?
DevOps is a cultural change made possible by a series of tools that automate code development. It's supposed to be the next step of evolution, unifying...
A proposal that won U.S. House approval Wednesday calls for crafting a strategy for securing the nation's electrical grid. It also would create a two-year pilot program within the U.S. Energy Department's National Laboratory to identify vulnerabilities within the grid.
The Justice Department has charged five individuals with running a high-tech Ponzi scheme that allegedly fleeced investors out of $722 million by falsely promising clients big returns as part of a cryptomining operation.
Is automation making more promises than it can keep?
Automation is still on the upward hype-cycle, according to Garner's 2019 Hype Cycle for Threat-Facing Technologies, which means that security teams too often expect stellar results from automation solutions with little expert oversight. The reality is the...
Security experts speaking on the ending "locknote" panel at this year's Black Hat Europe highlighted trends from the conference, including the rise of fuzzing, simplification via the cloud, increasing vendor transparency as well as the industry too often still failing to focus on the basics.