cybersecurity

WHAT IS PROACTIVE CYBER DEFENSE?

It’s not hard to understand the concept of proactive cyber defense: acting in anticipation of an attack against a computer or network. The goal is getting in front of attacks by evading, outwitting, or neutralizing them early instead of waiting for the damage to start like reactive cyber defenses. It’s also not hard to understand the benefits of being proactive: preventing the negative effects of cyber attacks instead of trying to minimize the damage. The only thing hard…

Continue reading

cloud cybersecurity

What is Cloud Workload Protection?

Cloud usage is increasing rapidly. Analysts forecast growth of 17 percent for the worldwide public cloud services market in 2020 alone. This proliferation comes on top of already widespread cloud adoption. In a recent report by Flexera, over 83 percent of companies described themselves as intermediate to heavy users of cloud platforms, while 93 percent report having a multi-cloud strategy. With a growing number of companies planning on doing more in diverse cloud environments, cloud workloads are becoming…

Continue reading

cybersecurity innovation privacy regulation

Solving Data Privacy Once and For All

The way online services are setup today implies that the only technical means to provide a more personalized experience to customers is to collect as much as possible personal data into a server and then to put it into some machine that offers recommendations. Personalization is convenient, and we all want convenience, even at the price of compromise of our personal lives. This line of thought started with Amazon, Google, and Facebook, and today it…

Continue reading

innovation

Digital Transformation Is Hard and Existential

There is no large corporation on the planet which does not have digital transformation as one of the top three strategic priorities, and many have already deep-dived into it without necessarily understanding the meaning of success. Digital transformation is highly strategic, and many times existential due to the simple fact that technology changed everyone’s life forever and kept on doing that. A change that gave birth to a new breed of companies with technological DNA…

Continue reading

cybersecurity

The ACCEPTABLE Way to Handle Data Breaches

LifeLabs, a Canadian company, suffered a significant data breach. According to this statement, the damage was “customer information that could include name, address, email, login, passwords, date of birth, health card number and lab test results” in the magnitude of “approximately 15 million customers on the computer systems that were potentially accessed in this breach”. It is an unfortunate event for the company, but eventually, the ones hurt the most are the customers who entrusted…

Continue reading

cybersecurity innovation regulation

Spanning the Chasm: The Missing Link in Tech Regulation – Part 1 of 2

Mark Zuckerberg was right when he wrote in his op-ed to the Washington Post that the internet needs new rules, though naturally, his view is limited as a CEO of a private company. For three decades, governments across the globe have created an enormous regulatory vacuum due to a profound misunderstanding of the magnitude of technology on society. As a result, they neglected their duty to protect society in the mixed reality of technology and…

Continue reading

cybersecurity

How to Disclose a Security Vulnerability and Stay Alive

In recent ten years, I was involved in the disclosure of multiple vulnerabilities to different organizations and each story is unique and diverse as there is no standard way of doing it. I am not a security researcher and did not find those vulnerabilities on my own, but I was there. A responsible researcher, subjective to your definition of what is responsible, discloses first the vulnerability to the developer of the product via email or…

Continue reading

AI blockchain cybersecurity

Risks of Artificial Intelligence on Society

Random Thoughts on Cyber Security, Artificial Intelligence, and Future Risks at the OECD Event – AI: Intelligent Machines, Smart Policies It is the end of the first day of a fascinating event in artificial intelligence, its impact on societies, and how policymakers should act upon what seems like a once in lifetime technological revolution. As someone rooted deeply in the world of cybersecurity, I wanted to share my point of view on what the future…

Continue reading

AI

Softbank eating the world

Softbank acquired BostonDynamics, the four legs robots maker, alongside secretive Schaft, two-legged?robots maker. Softbank, the perpetual acquirer of emerging leaders, has entered a foray into artificial life by diluting their stakes in media and communications and setting a stronghold into the full supply chain of artificial life. It starts with chipsets (ARM), but then they divested a quarter of the holdings since Google (TPU) and others have shown that specialized processors for artificial life are…

Continue reading

AI cloud

The Not So Peculiar Case of A Diamond in The Rough

IBM stock was hit severely?in recent month, mostly due to the disappointment from the latest earnings report. It wasn’t a real disappointment, but IBM had a buildup of expectations from their ongoing turnaround, and the recent earnings announcement has poured cold water on the growing enthusiasm. This post is about IBM’s story but carries a moral which applies to many other companies going through disruption in their industry. IBM is an enormous business with many…

Continue reading

AI

Rent my Brain and Just Leave me Alone

Until AI is intelligent enough to replace humans in complex tasks there will be an interim stage, and that is the era of human brain rental. People have diverse intelligence capabilities, and many times these are not optimally exploited due to living circumstances. Other people and corporations which know how to make money many times lack the brainpower required to scale their business. Hiring more people into a company is complicated, and the efficiency level…

Continue reading

cybersecurity

Most cyber attacks start with an exploit – I know how to make them go away

Yet another new Ransomware with a new sophisticated approach?http://blog.trendmicro.com/trendlabs-security-intelligence/crypvault-new-crypto-ransomware-encrypts-and-quarantines-files/ Pay attention that the key section in the description on the way it operates is “The malware arrives to affected systems via an email attachment.?When users?execute the attached malicious JavaScript file, it will?download four files from its C&C server:” When users execute the JavaScript files it means the JavaScript was loaded into the browser application and exploited the browser in order to get in and then…

Continue reading

cybersecurity privacy

No One is Liable for My Stolen Personal Information

The main victims of any data breach are actually the people, the customers, whom their personal information has been stolen and oddly?they don?t get the deserved attention. Questions like what was the impact of the theft on me as a customer, what can I do about it?and whether I deserve some compensation are rarely dealt with publicly. Customers face several key problems when their data was?stolen, questions such as: Was their data stolen at all?…

Continue reading

cybersecurity

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand in this match.? Attackers are on the rise due to their growing financial interest?motivating a new level of sophisticated attacks that existing defenses are unmatched to combat. The fact that almost everything today is connected to the net and the ever-growing complexity of software and…

Continue reading

cybersecurity

To Disclose or Not to Disclose, That is The Security Researcher Question

Microsoft and Google are?bashing each other on the zero-day exploit in Windows 8.1 that was disclosed by Google last week following a 90 days grace period. Disclosing is a broad term when speaking about vulnerabilities and exploits – you can disclose to the public the fact that there is a vulnerability and then you can disclose how to exploit it with an example source code. There is a big difference between just telling the world…

Continue reading

cybersecurity

Google Releases Windows 8.1 Exploit Code – After 90 Days Warning to Microsoft

Google Project Zero has debuted with the aim of solving the vulnerabilities problem by identifying zero-day vulnerabilities, notifying the company which owns the software, and giving them 90 days to solve the problem. After 90 days they publish the exploit. And they just did it to Microsoft. I remember quite a while ago when we decided at the cyber labs at Ben-Gurion University to adopt such a policy following our discovery of a vulnerability in…

Continue reading

cybersecurity

Counter Attacks – Random Thoughts

The surging amount of cyber attacks against companies and their dear consequences pushes companies to the edge. Defensive measures can go only so far in terms of effectiveness, assuming they are fully deployed which is also far from being the common case. Companies are too slow to react to this new threat which is caused by a fast-paced acceleration in the level of sophistication of attackers. Today companies are at a weak point. From a…

Continue reading

cybersecurity

A Tectonic Shift in Superpowers or What Sony Hack Uncovered to Everyone Else

Sony hack has flooded my news feed in recent weeks, everyone talking about how it was done, why, whom to blame, the trails which lead to North Korea, and the politics around it. I?ve been following the story from the first report with an unexplained curiosity and was not sure why since I read about hacks all day long. A word of explanation about my “weird” habit of following hacks continuously, being a CTO of…

Continue reading

patents

Wikipedia for Patents?

Recently I have been dealing a lot with patents and I have to say this is not easy! Patents although claimed to be written in English are most of the time just cryptic. It is almost impossible to an effective patent search and even when you get results, just decrypting what is written here is an impossible task. In the field of information retrieval patents I guess are considered something very difficult to crack and…

Continue reading

innovation

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports the external interface. Let me elaborate on this: The internal perspective shows the building blocks and layers within the application allowing specific data flow and processing. To further simplify things let’s take an example from the real world and that is a real building block.…

Continue reading

startups

Everyone focus now on revenues and efficiency as opposed to last year efforts?

The end of year is full of posts about how all startups and CEOs (now after the market meltdown) are going to be focused in 2009 on revenues, efficiency, listening to customers, making better products, and more… Just the other day I read Some startup CEOs? New Years’ resolutions where most resolutions sound like boiler plated stuff. It is not that I don’t appreciate efficiency and revenues, don’t get me wrong, but still one has…

Continue reading

innovation

Google?s Aspired Hegemony

After writing yesterday about the launch of Google Pages Beta at Should Google Lead the Web Development Tools Market? I realized that Google has changed profoundly from what they were at first. At the beginning, Google was an enabling technology by really making the world wide web “matter” accessible to everyone. They have contributed immensely in making the web a useful and enjoyable place to be. Ever since Google raised their head towards direct competition…

Continue reading

blogging startups

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision and probably the only permanent thing here is me and Strategic Board the name itself:) One of the building blocks a competitive intelligence tool is required to have in order to be effective is comparisons and more specifically product comparisons. Product comparisons, whether it is…

Continue reading

innovation

Can Microsoft afford to ignore Linux?

Microsoft completed the acquisition of Sybari Software, their new anti-virus and anti-spyware line of business – The Windows Observer–Antivirus, Anti-Spyware Strategy Moves Forward for Microsoft. One line from the news caught my eye as something that makes immediate common sense but may not be right strategically after all “Not surprisingly, Microsoft will discontinue new sales of Sybari’s products for the Unix (Solaris and AIX) and Linux operating systems. It will, however, continue to sell and…

Continue reading

cybersecurity

Why CEO should blog – my personal experience

Amanda Watlington relates to USAToday article on Blogging and CEO on a post Blogs and Feeds: CEO Blogs — Where Angels(?) Fear to Tread. I am a CEO of a new venture company and a blogger for the last four months and I wanted to write down what do I get from it: 1) Feedback on my thoughts – As a CEO and a person in general I have different opinions on various subjects related…

Continue reading