Mark Albertson

Mark Albertson is a senior writer for theCUBE, SiliconANGLE Media’s livestreaming studio. He is an experienced technology reporter, recognized by Onalytica as a "Who's Who In Cloud Influencer" and named to Peerlyst’s “24 Powerful Cybersecurity Journalists.” Prior to SiliconANGLE, Mark wrote for the San Francisco Examiner, Blasting News, and CBS-Bay Area.

Latest from Mark Albertson

VIDEO EXCLUSIVE

Unseen IoT threats bring major vulnerabilities, says Symantec exec

Cardiac devices, baby heart monitors, webcams, automobiles … all “internet of things”-connected today and all very hackable. These are just a few of the estimated 27 billion IoT devices expected to be on the market by the end of this year. And most of those devices will represent a big cybersecurity threat if not properly ...

Attack scale dictates ‘zero-trust’ cybersecurity approach for Palo Alto Networks

Just how significant is the threat activity by malicious actors against the global cybercommunity? One major cybersecurity company offers a hint of the current level of attacks. “We find 20,00 to 30,000 brand new pieces of malware every day,” said Scott Stevens (pictured), senior vice president of worldwide systems engineering at Palo Alto Networks Inc., ...

IT and OT plus IoT equals big challenge for security against nimble attackers

Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter. One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown ...

Envisioning a tech future based on managing digital risk and building trust

When Rohit Ghai (pictured) was named RSA Security LLC’s new president in 2017, he spoke about the importance of connecting insight with context to manage business risk. Two years later, the cybersecurity community is warily assessing risks associated with the explosive growth of new internet of things connected devices where protection has not always been ...
CYBERSECURITY SPECIAL REPORT

In harm’s way: Attacks on critical systems alarm the security world

One by one, power to homes, businesses, hospitals and transportation systems were shut down. It was Dec. 23, 2015, in the Ukraine and the nation’s electrical grid had been hacked. In the dead of winter. What events in the Ukraine revealed was that the world’s critical infrastructure was highly vulnerable to attack, both from outside ...
VIDEO EXCLUSIVE

Splunk’s security solution is a deep dive into the investigative lake

A case could be made that the current chaotic enterprise computing landscape offers firms such as Splunk Inc. a prime market opportunity. With so much surface area to protect, including multiple servers, endpoints and connected “internet of things” devices, managing the complex environment with logs in different formats is no easy task. Security in today’s enterprise ...

Fresh look at building automation security exposes network vulnerability

Engineers at Forescout Technologies Inc. call it the “wow effect.” When they meet with a client and present a complete overview of a network, the response is invariably a jaw-dropping, forehead-slapping exclamation. Many surprised customers often had no knowledge of how many devices were online or the threat exposure that created. “They had no idea ...
VIDEO EXCLUSIVE

What’s on my network? Forescout offers an agentless way to find out

When a person comes home, he or she probably wants to know fairly quickly if anyone else is inside and whether they’re friend or foe. The same is true for chief information officers who constantly ask: “What’s on my network?” As the number of “internet of things” devices connected to a network rises exponentially, so ...
CYBERSECURITY SPECIAL REPORT

In the cyber arms race, humans will replace computers in the crosshairs

Like a supercharged car powering up a steep mountain, cybersecurity threats have shifted into another gear. In the beginning, when “script kiddies” tapping on rudimentary computers in their parents’ basements would break into websites and deface them, attacks were a nuisance and not much more. As major businesses began to use the internet for transactional ...

Imanis Data leverages machine learning to address enterprise fragmentation

Data may be driving today’s enterprise, but the engine is only using a fraction of its horsepower. A recent information technology study by Cohesity Inc. found that a significant majority — approximately 80 percent — of an organization’s data is not mission critical. It’s languishing in backups, object stores and archives scattered across public and ...