Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.
While serverless technology is becoming increasingly widely used, there has been a lack of understanding when it comes to serverless security implications. That’s a challenge that Protego Labs is looking to help solve with the release of a freely available open-source tool that helps organizations learn about serverless security. Serverless, also referred to as functions-as-a-service, […]
Neustar is improving its security capabilities with the addition of technology gained via the acquisition of caller authentication and fraud prevention vendor Trustid. Fraud can take many different forms, including caller fraud where unauthorized individuals attempt transactions or information retrieval. The promise of the Trustid platform is that it provides tools and technologies to help […]
Marriott International disclosed revised information on Jan. 4 about the massive data breach involving its Starwood Hotels division. The update includes both good and bad news about the impact from the data breach. First the good news: Originally Marriott reported on Nov. 30, 2018, that information from approximately 500 million individuals who have made reservations […]
Mozilla, an organization that is best known for its Firefox web browser, is starting 2019 by renewing focus on its Thunderbird email client. It’s a move that comes after a meandering 20-year path for the open-source organization’s email efforts. Email is not a new thing for Mozilla, and to understand how long the organization has […]
A pair of hackers have taken aim at vulnerable Google Chromecast media streaming devices, sending unauthorized content and messages to unsuspecting users. The attack, dubbed “CastHack,” identifies Google Chromecast devices that have been exposed to the public internet. The two attackers, who operate under the aliases of “HackerGiraffe” and “j3ws3r,” then abuse capabilities in Chromecast […]
The term “cloud-native” is increasingly being used by organizations and vendors alike as a new paradigm shift for how applications can run and be deployed in the cloud. For Bob Quillin, vice president for Oracle Cloud Developer Relations, cloud-native isn’t just about technology; it’s also about people and process. Quillin sold his company StackEngine to […]
The security of USB-based connections and devices is taking a step forward, with the official launch of the USB Type-C Authentication Program on Jan. 2 USB devices have become ubiquitous in modern computing, and in recent years USB Type-C has been introduced on leading notebooks, smartphones and other connected devices because it enables faster data […]
As 2018 draws to a close, it’s a good time to reflect on the year that was in cyber-security to learn from past mistakes and identify trends that will likely continue into the new year. 2018 saw no shortage of major breaches, new critical vulnerabilities and policy changes that enterprise IT organizations will still be […]
The National Institute of Standards and Technology is out with the final version of its Risk Management Framework (RMF) 2.0 update, providing organizations with new detailed insight into how to define and manage risk. RMF 2.0 was officially released on Dec. 20 and follows seven months of consultation and comments. RMF 2.0 is formally titled […]
Distributed denial of service, commonly referred to by the acronym DDoS, represents a serious threat to enterprises of all sizes. In a DDoS attack, a large volume of traffic is directed against a target, overwhelming system resources and in effect denying anyone else access or service to the system. While organizations can and should take […]