Mark Albertson
Latest from Mark Albertson
Customer support is increasingly becoming an omnichannel experience
Knowledge may be power, but when it comes to solving a particularly thorny customer problem, there’s never enough information for most contact center personnel. The key is to provide customer support staff with multiple channel sources and plenty of data to resolve whatever issue there may be. “Omnichannel is really going to be a key ...
Phishing and nation-state hacking add tension to the threat landscape for cybersecurity experts
The key to a successful robbery isn’t breaking a window or short-circuiting an alarm system. It’s having the victim graciously open the heavily locked front door and letting the thief right in. In the cybsersecurity world, email phishing is by far the most prevalent form of attack. According to a Trustwave Holdings Inc. study, phishing ...
VIDEO EXCLUSIVE
Death by hacking remains a real concern in the medical community
As if the possibility of harm from illness or disease were not enough to worry about, unsecure medical devices designed to help could kill us too. Last week, Check Point Software Technologies Ltd. posted the results of a study that warned that internet of medical things, or IoMT, devices, such as MRI or X-ray machines ...
As cybersecurity threats rise, solutions fatigue sets in for CISOs
Are chief information security officers growing tired of having to manage multiple solutions and vendors to protect their businesses? The recently concluded RSA Conference in San Francisco attracted 42,000 attendees and more than 700 exhibiting companies, just a portion of the total cybersecurity vendor community. With one company finding up to 30,000 new malware threats per ...
VIDEO EXCLUSIVE
Unseen IoT threats bring major vulnerabilities, says Symantec exec
Cardiac devices, baby heart monitors, webcams, automobiles … all “internet of things”-connected today and all very hackable. These are just a few of the estimated 27 billion IoT devices expected to be on the market by the end of this year. And most of those devices will represent a big cybersecurity threat if not properly ...
Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks
Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks. “We find 20,00 to 30,000 brand new pieces of malware every day,” said Scott Stevens (pictured), senior vice president of worldwide systems engineering at Palo Alto Networks Inc., ...
IT and OT plus IoT equals big challenge for security against nimble attackers
Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter. One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown ...
Envisioning a tech future based on managing digital risk and building trust
When Rohit Ghai (pictured) was named RSA Security LLC’s new president in 2017, he spoke about the importance of connecting insight with context to manage business risk. Two years later, the cybersecurity community is warily assessing risks associated with the explosive growth of new internet of things connected devices where protection has not always been ...
CYBERSECURITY SPECIAL REPORT
In harm’s way: Attacks on critical systems alarm the security world
One by one, power to homes, businesses, hospitals and transportation systems were shut down. It was Dec. 23, 2015, in the Ukraine and the nation’s electrical grid had been hacked. In the dead of winter. What events in the Ukraine revealed was that the world’s critical infrastructure was highly vulnerable to attack, both from outside ...
VIDEO EXCLUSIVE
Splunk’s security solution is a deep dive into the investigative lake
A case could be made that the current chaotic enterprise computing landscape offers firms such as Splunk Inc. a prime market opportunity. With so much surface area to protect, including multiple servers, endpoints and connected “internet of things” devices, managing the complex environment with logs in different formats is no easy task. Security in today’s enterprise ...