Former FOX News - CIA cybersecurity officer calls out tech companies for making insecure devices

Former FOX News - CIA cybersecurity officer calls out tech companies for making insecure devices

A former chief information security officer for the Central Intelligence Agency and current advisory board member of AppGuard is blasting tech companies – like Microsoft – for making insecure computers and selling them to consumers.

Are developers retiring faster than the programming languages they use?

Are developers retiring faster than the programming languages they use?

Somewhere there is a graveyard for dead programming languages with tombstones marked "</fortran>."

Every technology has a predictable life cycle, and when one language reaches the end of its modern usability, an alternative needs to step in. However, even retired programming languages still exist in the decades beyond their anticipated expiration as a foundation or teaching tool for other languages.

Are trusted devices becoming obsolete?

Are trusted devices becoming obsolete?

In a world where devices can have inherent security flaws, how do we make authentication safer?

Traditional cybersecurity measures are being re-examined as new technology, such as internet of things (IoT) devices, creates a larger attack surface and cybercrime incidents become more sophisticated, innovative and damaging.

The Cyber Attacks NOT Making Headlines Are The Scary Ones

The Cyber Attacks NOT Making Headlines Are The Scary Ones

Great authors don’t reveal too much of the villains, monsters, or evil entities in their work. They learned long ago that the audience is almost always disappointed when they try. As CEO of a cybersecurity vendor with products and services defending government, corporate, and consumer computers all over the world, my colleagues and myself are frequently asked ‘what were last year’s scariest cyber attacks’. 

Cyber Criminals Love the 'Detect and React' Cyber Security Approach

Cyber Criminals Love the 'Detect and React' Cyber Security Approach

Gift buying and traveling, especially during the winter holidays, creates an environment ripe for cybercrime. During this frenzied period, retailers and hospitality providers must keep their revenue generating systems up and running to keep moving product, charming customers, and making lasting holiday impressions. However, an alarming Cisco survey found that a typical enterprise of any industry is staffed only with enough security analysts to act upon half of its cyber alerts.  This could be because many companies believe in a 'detect and react' approach. Unfortunately, cyber criminals can easily take advantage of this lack of security.