Articles By Howard Solomon

authentication fob

Max factor: Toughening authentication

Stung by two data breaches, the White House last month ordered a so-called "30-day Cybersecurity Sprint" to tighten IT protection...

July 3rd, 2015 Howard Solomon
DDoS Attack Brick Wall

Warning to CISOs: Old routers could be aiding DDoS attacks

Most CISOs understand the security problems with old network equipment. A new report this week from Akamai Technologies' security and...

July 2nd, 2015 Howard Solomon

Cisco to buy cloud security provider

Cisco Systems intends to strengthen its security portfolio by buying OpenDNS,  a company that  provides a cloud-based service to block malware....

June 30th, 2015 Howard Solomon

Patch warning: Exploit kit already takes advantage of Flash vulnerability

When it comes to patching software, Adobe Flash fixes may not be highest in priority for some organizations. Not for...

June 29th, 2015 Howard Solomon

Software developers still failing to create secure code: Report

Buying packaged applications or subscribing to a cloud service are the only way to go for many organizations, for these...

June 29th, 2015 Howard Solomon
cloud security

How CISOs can find and secure rogue cloud applications

An insurance company is not the enterprise whose staff should be fooling around with insecure cloud applications. But with software-as-a-service...

June 26th, 2015 Howard Solomon
security and privacy issues

Industrial control system breaches rising, says new report

Breaches that result in the theft of millions of pieces of personal data get big headlines, such as those involving...

June 25th, 2015 Howard Solomon

A CISO primer for threat information sharing specifications

Threat information sharing is becoming the new infosec pro buzz phrase, in part because President Barak Obama is encouraging the...

June 24th, 2015 Howard Solomon
Bank vault

Cyber attacks on financial sector three times other industries: Report

In March of this year 15 Canadian financial institutions were targeted by new a malware attack aimed at stealing passwords....

June 23rd, 2015 Howard Solomon
Web vulnerabilities to be stomped out

Web vulnerabilities need to be stamped out

Earlier this month infosec pros at at the Toronto SC Congress conference got an earful from Canadian Dave Lewis of...

June 22nd, 2015 Howard Solomon