Evolution of threat intelligence sharing improves cybersecurity

cyberthreat intelligence sharing

Image: iStock

The cyberthreat landscape is becoming increasingly complex. Threats, attacks, zero-days, exploit kits and all the cyberattack whatnot are multiplying and expanding at a worrying rate, and fact of the matter is the tech community and security vendors are indeed hard pressed to detect and react to new threats in an organized and timely manner. As a consequence, sophisticated attackers can conduct a breach, hide for months, and silently continue to siphon data from their victims. Continue reading


Why do we need to take IoT security more seriously?


It goes without saying that cybersecurity is a serious concern, especially as internet and online services become more ingrained in our lives. Since the advent of Internet of Things (IoT), the number of connected devices in our homes, office and on our person is growing at a fast pace. Connected devices already outnumber human beings, and continue to propagate at a chaotic pace across many fields, including healthcare, home appliances, industrial control systems (ICS) and vehicles. Continue reading

The role of big data in securing online identities


A lot is being said about the benefits big data and analytics. Everywhere companies are using big data and analytics to better understand customer behavior and improve products and offer better customer service (and display ads that are more likely to influence the viewer and produce better click through rates). Analytics are being used to make better market predictions, improve efficiency and utility, decrease costs and consumption levels…

Big data is also riddled with privacy issues, which is being talked about as well. Things such as habits, personal information and sensitive health information being collected by service providers without the consent of consumers have become common controversial issues. Just recently, Oculus Rift was brought to highlight because of its murky data collection policy. And don’t get me started on the privacy issues about privacy issues introduced by the Internet of Things. Continue reading

How mobile technology is helping improve authentication


For many years, the issues with password-based authentication have been riddling the cybersecurity industry. Passwords are being stolen, bruteforced and circumvented in a myriad of ways by hackers that are seeking to find their way into the accounts of their unfortunate victims. The main mechanism to counter this problem has historically been known as two-factor and multifactor authentication (2FA/MFA).

Basically, two-factor authentication involve the combination of something you know (the password) and something you have (physical token, fingerprint, retina scan, voice recognition…) in order to authenticate users. Continue reading

Your smarthome is dumber than you think


There is a lot of talk about how the Internet of Things (IoT) is making our homes smarter, which effectively boils down to making our lives more comfortable, reducing energy consumption and creating opportunities that were previously inconceivable. But as our homes become “smarter” from a utilitarian perspective, they are becoming dumber from a security point of view, and they are opening up some pretty nice opportunities for burglars, cyber-criminals, and anyone who wants to do us harm to carry out their evil deeds. Continue reading

The Tay episode proves we’re still not ready for true AI


Over the past week much has been made about the launch and (temporary) shutdown of Microsoft’s chatbot Tay. For those of you who might not know, Tay is a machine learning project that was launched with the goal of conducting research and development in the field of conversational understanding. It’s a bot that can chat with users online, and it has presence over several platforms, including Twitter, GroupMe and Kik. Tay is programmed to mimic the behavior of a young woman, tell jokes and offer comments on pictures, but she’s also designed to repeat after users and learn from them in order to respond in personalized ways. Continue reading