In the third of this three-part series, I share why organizations need to implement a Zero Trust security model to keep corporate and customer data secure.
Until the late 1980s, it was relatively common for employees to be physically located at a workstation, computer or kiosk, working inside offices, banks, factories, retail stores, gas stations, hospitals, hotels and so forth. As laptop computers and became mainstream from the early 1990s, there began a shift in the way people access information, where that information lives and also the devices are mobile (not fixed). Information no longer resides exclusively or at all…
In my first blog post, I shared real and potential incidents that underscore the importance of protecting identity, both in the physical and online realms.
Growing up, I was used to having an unlocked house mailbox and trusting others to not pry into my mail. I took the safety of an unlocked mailbox for granted — not anymore. In the last few months, multiple neighbors and relatives have had their mailbox broken into by adversaries wanting to view, steal, and even move mail to an unknown location, far from the mailbox owner.
Because the US Postal Service is a federal agency, mail theft is charged as a federal offense under US Code Section 1708. Imagine if a criminal were to use information they…
1. Remember that security is a shared responsibility between the cloud service provider and the data owner (you)— and that’s a good thing! In particular, larger cloud providers tend to have a significant security staff and standard cloud architecture, security controls and diverse audits, making them better served to manage various aspects of cloud security. However, there are some aspects for which you as the data owner need to take responsibility.
Organizations are embracing hybrid and cloud infrastructures to host their applications and experience benefits including greater business agility and operational cost savings. But what happens when an adversary lurks around the cloud with nefarious intentions?
While developers and IT professionals are responsible for developing secure code and maintaining security of systems and applications, users also need to be savvy enough to securely navigate technology in this connected era. It takes an army — not any single team or person in an organization — to mitigate drive-by-downloads and other cyber threats.
Imaging you are driving a car through an unknown part of town. You blindly follow directions using a voice-assisted navigation assistant on your mobile phone. Perhaps the surroundings are so disorienting that you fail to notice another car trailing yours and taking many of the same turns. Could the driver be attempting to follow you home?
In our hurry to “get there fast” both on the road and on the web, we sometimes overlook signs that warn us of impending danger.
A drive-by download (DbD) attack occurs when an unsuspecting user visits a web site and unintentionally downloads malicious code…
According to Merriam Webster, ‘resilience’ is defined as “an ability to recover from or adjust easily to misfortune or change”. Without resilience, we simply cannot live. People endure poverty and hunger; towns recover after a major disaster; even babies must leave the comfort and security of the womb to grow and survive. All of these things require resilience to be possible.
In Part 1 of “What we learn from analyzing global malware trends”, we noted that in 2018, global malware encounter rates declined. We shared 3 reasons explaining this trend, but noted that there are still parts of the world where the malware encounter rate remains high.
An analysis of the Asia Pacific market* for the period Jan 2018 — Dec 2018 reveals that the region’s average malware encounter rate was 37% higher than the global average. The infographic above shows the three countries with the highest encounter rates and three with the lowest. …
This is a rare sentence in the security world, but we actually have some good news: From January to December 2018, global malware encounter rates declined approximately 34% according to research from Microsoft’s Windows Defender Security Intelligence team. Why?
Work for Microsoft in Cybersecurity Solutions Group, with 15+ years of experience marketing IT security and robotics technologies. Mother, Bollywood singer :)