Articles By Howard Solomon

Mobile Security

Warning: Protect your mobile phone numbers from being hijacked

Ever since they appeared a decade ago smart phones have been a thorn in the side of CISOs, offering attackers...

August 25th, 2017 Howard Solomon

Samsung Group head sentenced to five years in bribery trial

Samsung Group leader Jay Y. Lee has been convicted of bribing former South Korean President Park Geun-hye and sentenced to five...

August 25th, 2017 Howard Solomon

Taking the hype out of artificial intelligence

Artificial intelligence is all the rage in IT these days, with vendors rushing out new products and trying to assure...

August 24th, 2017 Howard Solomon

How to get the most from a penetration test

Penetration tests are among the blunter tools CISOs use to find out weaknesses in their cyber security program. Whether conducted...

August 23rd, 2017 Howard Solomon

Warning to CISOs: Industrial cobots need to be watched

It's hard enough for CISOs to deal with humans in their enterprises. A new report from a security vendor warns...

August 22nd, 2017 Howard Solomon
email, spam

Spammers busiest mid-week and during business hours, says IBM

Are you sluggish on Mondays and Fridays? So are spammers. That's one of the findings IBM researchers came up with...

August 21st, 2017 Howard Solomon
Alissa Johnson Xerox CISO

Interview: Xerox’s Alissa Johnson on how to avoid being ‘the CISO of No’

Alissa Johnson is a rarity among technology executives: She has said no to a President of the United States. “I...

August 21st, 2017 Howard Solomon
DDoS Attack Brick Wall

Canadian service provider Cogeco Peer 1 adds web app DDoS protection

Service provider Cogeco Peer 1 has expanded its distributed denial of service (DDoS) products with the addition of web application protection....

August 17th, 2017 Howard Solomon
Magnifying glass on keyboard

How to track down the infrastructure supporting malware distribution

A good CISO always looks for ways to increase the skills of staff – in fact, it’s a necessity given...

August 17th, 2017 Howard Solomon

Attacks on network management tool maker, Chrome extension developers revealed

While direct attacks on enterprise networks through phishing and SQL injection are common, threat actors are also looking for weaknesses...

August 16th, 2017 Howard Solomon