Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

2017 was the year of ransomware. Ransomware has been around for years, but the victims were typically non-technical consumers: the impact, although serious from the victim's perspective, was limited. In 2017 we've seen huge ransomware attacks close down hospitals and businesses, putting lives and billions of dollars at risk. 2018 has to be the year we fight back. The organized crime groups behind ransomware won't stop any time soon. For them, it's easy money. Attacks will increase in sophistication and tenacity. Businesses have to be ready. What does it mean to be ready for a ransomware attack? Any business that follows security and disaster recovery planning best practices has an infinitesimally small chance of being successfully targeted with ransomware. If you're smart about it, you won't have to pay a ransom even if your network is infected and your data encrypt... (more)

Three Ruling Technology Trends | @DevOpsSummit #DevSecOps #Blockchain

Three Ruling Technology Trends to Watch Out for in 2018 As we head into a new year, IT improvements and management should be top of mind for any business looking to amp up their customer experience, delivery and service in 2018. Recently, at CA World ‘17, I talked about how every business strategy is now an IT strategy. With that in mind, I have a few predictions for 2018 that I encourage companies to have on their to-do list as they look to find greater success in the new year. #1 It's all about DevSecOps Security will remain top of mind for customers, but the software development lifecycle will now need to integrate security from start to finish in a seamless way. The need for speed and velocity with quality in development has created a "shift-left" movement that integrates security from the start, which needs to be easy and accessible for developers as they write c... (more)

Five Hospitality Predictions for 2018 | @CloudExpo #AI #ML #Cloud

Five Hospitality Predictions for 2018 | Tech, AI and Convenience to Dominate the Industry The hotel and hospitality industry, enabled with advanced technology and more collaboration with associated businesses, will see some important trends in 2018 as hotel brands reinvent themselves to cater to a new type of clientele. Millennial guests will dominate the landscape, and reshape the industry with demands for more automated options and conveniences and the ability to do everything from a smartphone, and hotels - eager to deliver more conveniences to this younger audience - will forge closer alliances with retailers and community destinations. Hotel guests will place increasing priority on booking rooms that are totally connected, fully automated, and with an ability to seamlessly check in, check out, and access services, all through a smartphone app and without the ne... (more)

Cryptocurrencies, Bitcoin and Nanocrime | @CloudExpo #Bitcoin #FinTech

Bitcoins are a digital cryptocurrency and have been around since 2009. As a substitute for legal tender, they are becoming a rage for investors and others but because there is no government agency auditing or performing regulatory oversights, you wonder if it is the perfect breeding ground for electronic nanocrime? Since the introduction of the Bitcoin, some competitors have emerged and the whole segment of cryptocurrencies are defined as Altcoins. Altcoins include: Dogecoin, Ethereum, Feathercoin, Litecoin, Monero, Novacoin, Peercoin, and Zetacoin. Some of these cryptocurrencies are considered improvements on the original Bitcoin algorithm structure, and they are gaining some traction as well. Some financial experts and analysts, including Warren Buffett and Ben Stein, are leery of the overall cryptocurrency market. Is it because it doesn't fit into their more tr... (more)

Security Is No Excuse for Bad Performance | @CloudExpo #Cloud #WebPerf

Security Is No Excuse for Bad Performance By Craig Lowell These days, no matter what task you’re trying to accomplish within your online properties, chances are there’s at least one cloud solution that provides it. However, with so much of our personal and business data living now online, there’s perhaps no functionality more important than cloud security. With cyber attacks more prevalent than ever, it’s imperative that organizations – regardless of their size and scope – protect both themselves and their clients from nefarious individuals who prey on unsecured networks and data. According to CSO, cyber crime will account for over $6 trillion annually by 2021, making it the biggest risk to just about every company in the world. Correspondingly, the amount of money spent on cyber security has grown by 7% annually since 2016, and is projected by Gartner to grow again... (more)

Internet of Blockchains | @ExpoDX #FinTech #Blockchain #Hyperledger #Bitcoin #Ethereum

Internet of Blockchains: How Networks of Distributed Ledgers Will Enable Scalability and Cross-Chain Value Exchange A few years ago – in the early days of Blockchain – a lot of people were taken with the idea of a multifunctional chain on which all transactions could be handled. After Ethereum was launched in 2014, its advocates were talking themselves hoarse about the transformative opportunities the platform introduced. Decentralized applications, they predicted, along with all sorts of value transfers would be executed exclusively on Ethereum from that point on, and no other networks would ever be needed. However, that belief didn’t last long: experts saw major networks facing scalability issues when trying to increase their user bases and, also, they saw the frequent hacking. After a while, there were but a few people left who supported the concept of the “one... (more)

Top Places to Check for Signs of a Targeted Attack in Your Network | @CloudExpo #Cloud #Security

Targeted attacks on the network of a business can be big trouble. A business should know where to look and what to look for to stop the attacks. Businesses are aware of the dangers of hackers. They know that a hacker can steal private information that hey store on their computer networks. They recognize that hackers can create problems for the business and the business's computer systems through a variety of different ways. Being aware of the dangers and knowing what to do about them is not the same thing. Unless a business has a big IT department, their ideas about network security are not always correct. They may not realize that they are the target of hackers. They may assume that hackers either try to cast a wide net with the hope of catching someone or they target bigger companies. A smart business recognizes the threats of targeted attacks and knows where and ho... (more)

What GDPR Is and How to Comply with It | @ExpoDX #DX #GDPR #Security

What GDPR Is and How to Comply with It: A Brief Guide As you have probably heard, the EU commission signed the General Data Protection Regulation (GDPR) back in April 2016. The legislation is designed to help companies handle efficiently the data challenges of the 21st century and give strict guidelines as to how to work with massive flows of digital information. It is set to protect web users (data subjects) from malicious use and loss of their personal info and, also, to give people greater control over how their records are processed. GDPR is to take effect on May 25, 2018. Company runners still have time enough to modify organizational processes to comply fully with new security rules, and today we will explain how they should start. What Exactly Is GDPR About? First off, it outlines how companies that work with EU personal data should obtain client’s consent. ... (more)

How Access Management Protects Today’s No-Perimeter Network | #SDN #Cloud #Security

How Access Management Protects Today's No-Perimeter Network The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through social engineering. This is not to suggest that all is lost. Rather, organizations can defeat cybercriminals, in part, by better managing what has already been put in place. As an example of what can go wrong if that doesn't happen, consider the following story. On the way in to his office one day, Chris, the CSO of Big Deal Company, runs into Kate from cryptography, who comments that their IT admin, Tim, has been hard at work since about 5:00 a.m. This seems odd, since Tim is not known to be a morning person. Kate says Tim requ... (more)

Vivint to Exhibit at @ThingsExpo | @VivintHome #IoT #IIoT #Vivint #SmartHome #SmartCities

SYS-CON Events announced today that Vivint to exhibit at SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California. As a leading smart home technology provider, Vivint offers home security, energy management, home automation, local cloud storage, and high-speed Internet solutions to more than one million customers throughout the United States and Canada. The end result is a smart home solution that saves you time and money and ultimately simplifies your life. CloudExpo | DXWorldEXPO have announced the conference tracks for Cloud Expo 2018, introducing DXWorldEXPO. DXWordEXPO, colocated with Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (... (more)

Privacy and Security on Blockchains | @CloudExpo #FinTech #Blockchain

Privacy and Security on Blockchains: What Protection Measures the Networks Are Adopting to Secure Their Users Decentralization of everything, the great new idea of which the web can’t stop babbling, might still seem a bit utopian if you inspect it closely. Yes, blockchains are likely to reshape our economy, or a huge part of it, and benefit considerably those who are currently unbanked. They might also facilitate the creation of rating/reputation systems that are not controlled by any single entity and thus allow people (say Uber drivers who’d like to work for Lyft) to switch employers without having to establish their credibility anew. They might give users complete control over their assets; protect them, to a degree, from being robbed and provide tools to sustain privacy even when a state-level actor – a bank or a government – is after their identity. But before t... (more)