Articles By Howard Solomon

How to get the most from a penetration test

Penetration tests are among the blunter tools CISOs use to find out weaknesses in their cyber security program. Whether conducted...

August 23rd, 2017 Howard Solomon

Warning to CISOs: Industrial cobots need to be watched

It's hard enough for CISOs to deal with humans in their enterprises. A new report from a security vendor warns...

August 22nd, 2017 Howard Solomon
email, spam

Spammers busiest mid-week and during business hours, says IBM

Are you sluggish on Mondays and Fridays? So are spammers. That's one of the findings IBM researchers came up with...

August 21st, 2017 Howard Solomon
Alissa Johnson Xerox CISO

Interview: Xerox’s Alissa Johnson on how to avoid being ‘the CISO of No’

Alissa Johnson is a rarity among technology executives: She has said no to a President of the United States. “I...

August 21st, 2017 Howard Solomon
DDoS Attack Brick Wall

Canadian service provider Cogeco Peer 1 adds web app DDoS protection

Service provider Cogeco Peer 1 has expanded its distributed denial of service (DDoS) products with the addition of web application protection....

August 17th, 2017 Howard Solomon
Magnifying glass on keyboard

How to track down the infrastructure supporting malware distribution

A good CISO always looks for ways to increase the skills of staff – in fact, it’s a necessity given...

August 17th, 2017 Howard Solomon

Attacks on network management tool maker, Chrome extension developers revealed

While direct attacks on enterprise networks through phishing and SQL injection are common, threat actors are also looking for weaknesses...

August 16th, 2017 Howard Solomon

Attack combining Office exploits shows need to improve patching speed

Exploits of holes in Microsoft Office have been around for years, but Cisco Systems' Talos threat intelligence service has sighted...

August 15th, 2017 Howard Solomon
Artificial Intelligence Neural Network

Researchers seek fool-proof Android malware detection with AI

With its open architecture Android has always been seen by threat actors as boon for creating and distributing malware. One...

August 14th, 2017 Howard Solomon
graphic of data lock

How CISOs can make execs more security-aware

Most CISOs know by now that cyber attacks on the executive suite are increasing.  Just this week a prankster duped...

August 11th, 2017 Howard Solomon