Why We Should All Pay for Smartphone Apps
Suppose Josephine and Rick have built the most incredible smartphone application ever. They offer it up to the market for a few dollars, and next thing we know they are millionaires. Their customers...
View ArticleSolving the End User Problem
Every IT manager knows that poor behavior of the part of end users is the biggest challenge in cybersecurity. The problem is primarily due to a lack of education – users don’t realize which of their...
View ArticleMobile Malware Update (and Juniper’s report)
As a small part of my day job, I put together a monthly “Cybersecurity Digest”. Most of my subscribers are IT Managers in large organizations. I created the digest especially because I like...
View ArticleInternet Safety While Traveling – Deeper Dive
A “man in the middle” or MIM attack is not particularly difficult to pull off, and it represents one of the biggest cyber security threats we face when we are traveling – or in fact, any time we...
View ArticleThe Most Important Things to Know About Internet Safety While Traveling
My cousin is on his way to Germany for a week and asked for some advice on being “cyber safe” while there. In other words, how can he stay connected with people and email but not become a victim of...
View ArticleHas Target Done Enough?
My favorite analogy in security is the one which describes each internet defense as a slice of swiss cheese: they all have their holes (weaknesses). The idea – if we want the best security – is to...
View ArticleTarget breach update – how were HVAC passwords stolen?
As we learned from Krebs a few days ago in a Target breach update, the original entry point of the malicious software was Target’s HVAC company. Yes, that means the folks who handle their air...
View ArticleCredit Card Fraud: Why the Payment Card Industry (PCI) Fails Consumers
A reporter asked me last week whether I think the PCI Standards have completely failed consumers and been proven useless — because of the recent breaches — and so should “Rest in Peace.” For those who...
View ArticleFor my latest blogs, please see…
…the ones I post at Kaspersky’s website, including Why Angry Employees are Everyone’s Problem and The Three Ps of Data Storage. I also post on LinkedIn, beneath my profile summary. These blogs can be...
View ArticleWhen Cybersecurity Vendors Lie
When Cybersecurity Vendors Lie* See if you can spot the problem inherent in this relatively common sales pitch: “For only $200,000 you can subscribe to our data feed today and receive truly actionable...
View Article