Mark Albertson
Latest from Mark Albertson
VIDEO EXCLUSIVE
Unseen IoT threats bring major vulnerabilities, says Symantec exec
Cardiac devices, baby heart monitors, webcams, automobiles … all “internet of things”-connected today and all very hackable. These are just a few of the estimated 27 billion IoT devices expected to be on the market by the end of this year. And most of those devices will represent a big cybersecurity threat if not properly ...
Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks
Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks. “We find 20,00 to 30,000 brand new pieces of malware every day,” said Scott Stevens (pictured), senior vice president of worldwide systems engineering at Palo Alto Networks Inc., ...
IT and OT plus IoT equals big challenge for security against nimble attackers
Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter. One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown ...
Envisioning a tech future based on managing digital risk and building trust
When Rohit Ghai (pictured) was named RSA Security LLC’s new president in 2017, he spoke about the importance of connecting insight with context to manage business risk. Two years later, the cybersecurity community is warily assessing risks associated with the explosive growth of new internet of things connected devices where protection has not always been ...
CYBERSECURITY SPECIAL REPORT
In harm’s way: Attacks on critical systems alarm the security world
One by one, power to homes, businesses, hospitals and transportation systems were shut down. It was Dec. 23, 2015, in the Ukraine and the nation’s electrical grid had been hacked. In the dead of winter. What events in the Ukraine revealed was that the world’s critical infrastructure was highly vulnerable to attack, both from outside ...
VIDEO EXCLUSIVE
Splunk’s security solution is a deep dive into the investigative lake
A case could be made that the current chaotic enterprise computing landscape offers firms such as Splunk Inc. a prime market opportunity. With so much surface area to protect, including multiple servers, endpoints and connected “internet of things” devices, managing the complex environment with logs in different formats is no easy task. Security in today’s enterprise ...
Fresh look at building automation security exposes network vulnerability
Engineers at Forescout Technologies Inc. call it the “wow effect.” When they meet with a client and present a complete overview of a network, the response is invariably a jaw-dropping, forehead-slapping exclamation. Many surprised customers often had no knowledge of how many devices were online or the threat exposure that created. “They had no idea ...
VIDEO EXCLUSIVE
What’s on my network? Forescout offers an agentless way to find out
When a person comes home, he or she probably wants to know fairly quickly if anyone else is inside and whether they’re friend or foe. The same is true for chief information officers who constantly ask: “What’s on my network?” As the number of “internet of things” devices connected to a network rises exponentially, so ...
CYBERSECURITY SPECIAL REPORT
In the cyber arms race, humans will replace computers in the crosshairs
Like a supercharged car powering up a steep mountain, cybersecurity threats have shifted into another gear. In the beginning, when “script kiddies” tapping on rudimentary computers in their parents’ basements would break into websites and deface them, attacks were a nuisance and not much more. As major businesses began to use the internet for transactional ...
Imanis Data leverages machine learning to address enterprise fragmentation
Data may be driving today’s enterprise, but the engine is only using a fraction of its horsepower. A recent information technology study by Cohesity Inc. found that a significant majority — approximately 80 percent — of an organization’s data is not mission critical. It’s languishing in backups, object stores and archives scattered across public and ...









