David Strom


Latest from David Strom

CrowdStrike adds new cybersecurity protective tools – and Bionic.ai – to its Falcon lineup

CrowdStrike Holdings Inc. today announced new products extending its Falcon protection line and highlighted various threat research results from its annual Threat Hunting Report released last month. Also announced at the company’s annual Fal.con user group conference was the acquisition of Bionic.ai for cash and stock for an undisclosed amount. The companies expect this transaction to ...
ANALYSIS

California stays ahead on state privacy protection

California has become the latest state to enact a special law regulating how consumers can remove themselves from data brokers. The Delete Act was passed this week and it’s now up to Governor Gavin Newsom to sign it into law. But it has already led to similar laws and bills being proposed in other states ...

Deepfake cyberthreats keep rising. Here’s how to prevent them

As expected, this summer has seen a rise in various cybersecurity threats based on deepfake audio and video impersonations. Despite warnings from the Federal Bureau of Investigation in June, it’s now quite common to experience these types of threats. The fakes are used to lend credibility to larger exploits, such as for a phishing email ...

A network observability protocol standard gets a big boost

A networking protocol that has been under development for four years got a boost from both F5 Inc. and ServiceNow Inc. this week. Called OpenTelemetry — OTel or OTLP for short — the protocol has been endorsed by dozens of vendors and has a curious mixture of open- and closed-source code to help advance the cause ...

Cloud-based security threats on the rise, according to new IBM X-Force data

IBM Corp.’s X-Force security consultancy annual 2023 Cloud Threat Landscape Report is out today, and it’s not a pretty picture. Based on several collections of threat intelligence data compiled from June 2022 to June 2023, the report reveals that 82% of data breaches in its investigations involved various cloud data compromises. IBM found that cloud-related vulnerabilities ...

Beware of insecure networked printers

Despite promises of a paperless office that have origins in the 1970s, the printer is still very much a security problem in the modern office. And even if Microsoft Corp. will succeed in its efforts to eradicate the universe of third-party printer drivers from its various Windows products, the printer will still be the bane ...

It’s the end of the line for outdated internet encryption protocols

An aging core internet protocol is finally getting the ax by Microsoft Corp. But it wasn’t just last month’s announcement that the software vendor was ending support for versions 1.0 and 1.1 of Transport Layer Security, or TLS, but that it was actually dropping the support from the impending release of the latest beta version ...

New charges filed against Trickbot ransomware gang

The malware gang behind the Trickbot ransomware exploits, also known as Conti, faces a new series of charges by both the U.S. and the U.K. governments. The charges, filed yesterday, reveal the actual identities of the criminals, who will probably never see a courtroom, let alone a prison, anywhere in the world. Nevertheless, they represent a continued law enforcement ...

Software supply chain attacks are multiplying, but so are strategies to avoid them

By now most information technology managers are painfully aware of the consequences of software supply chain attacks. Thanks to exploits affecting the supply chains of SolarWinds,  Log4Shell and 3CX, the power and widespread damage inflicted by these attacks on thousands of businesses are certainly well-known. To try to remedy things, a raft of new supply ...

Well-known security consultant ‘Mudge’ is once again on the move

The former hacker known as Mudge is once again on the move. Mudge, the alias for Peiter Zatko (pictured, center), was the former head of security back when X Corp. was known as Twitter. He is now a consultant for the U.S. Cybersecurity and Infrastructure Security Agency, the Washington Post reported yesterday. Zatko has worked ...