Archive for the Cybersecurity Category






IoT Cybersecurity Reaching Tipping Point

IoT Cybersecurity Reaching Tipping Point
IoT Cyber Security Is Reaching A Tipping Point In an article on ITPro, Jeff Finn writes about how the state of IoT cybersecurity is reaching a tipping point, forcing IoT device manufacturers to work partners that excel at networking. "The writing on the wall for IoT device manufacturers is to get serious about security and develop fruitful channel partnerships with network technology providers. The consensus among enterprise professionals is that IoT security has emerged as a front-of-mind [...]Read more

Spambot Leak: 711 Million Email Addresses Ensnared

Spambot Leak: 711 Million Email Addresses Ensnared
Spambot Leak: 711 Million Email Addresses Ensnared by Lou Nabarrete, VP of Engineering and Data Operations Email Spam is dead! Long live Email Spam! It seems very strange that in the year 2017 (approximately 20 years from when the commercial use of the Internet first became possible), we are still dealing with email spam with no end in sight. There are many solutions now available in the industry that can be placed in various locations [...]Read more

Embedded Insiders Podcast – Keeping an eye on connected devices with data categorization

Embedded Insiders Podcast – Keeping an eye on connected devices with data categorization

In this week’s Embedded Insiders podcast, Rich Nass and Brandon Lewis welcome Jeff Finn, CEO of data categorization and security firm zvelo.

Read more

Looking forward to the DEF CON 25 Hacking Conference

Looking forward to the DEF CON 25 Hacking Conference

Two large annual security conferences are taking place in Las Vegas this week and I will be attending the second one.

Read more

How to Use “Let’s Encrypt” to Protect Your IT Organization

How to Use “Let’s Encrypt” to Protect Your IT Organization

Security TechTrends | zvelo Series by Eric Watkins, Senior Malicious Detection Researcher at zvelo In today’s world of malware and ransomware created to steal credentials and lock end users out of their machines, it’s important that we safeguard our credentials and data-at-rest (stored on our machines) and in transit (passing over the network). One of the best ways to secure data-in-transit is by ensuring that the services we use are configured to enable the strongest […]

Read more