By Mobile Helix CEO and Co-founder, Seth Hallem
Hackers are siphoning billions from the global economy each year by stealing data for profit. However, in spite of this rising threat, enterprises continue to make the same mistakes over and over again. It is time to change our assumptions and to re-think how we protect sensitive data.
Hacking is a booming business. Business has been good for several years now. Data breaches are at all-time highs. Cyber-attacks are skyrocketing, and ransomware is a growing fad. And the best news of all is that the same old tricks (see XSS, SQL Injection, SPAM ….) are still working just as well as they always have. How is it possible that a business that was estimated to cost the global economy $450 billion dollars is continuing to grow? That is a lot of money diverted to criminals in lieu of legitimate participants in our global economy.
As a wise man once said, the definition of insanity is to do the same thing over and over again while expecting a different result. The same could be said for the two main pillars of most organizations’ security strategies today: a strong perimeter (read firewalls, intrusion detection/prevention, spam filters, VPNs, etc.), and a desktop security suite (anti-virus). Clearly this is not working, so why do we keep doubling down on more and more sophisticated and expensive variations of the same thing?
Read the entire post at CSO Online
By Seth Hallem, originally published in HelpNetSecurity, Sept. 16, 2013
It has been an eventful time in the mobile world with two recent breaking stories revealing vulnerabilities in the security infrastructure for Android and iOS respectively. While vastly different in their nature, both point to a fundamental lesson that CISOs in an increasingly mobile world cannot ignore – when it comes to encryption, read the fine print. Otherwise you may find yourself up the proverbial creek without a paddle (i.e., remediation strategy).
Join this co-hosted ILTA Product Briefing webinar on Feb. 5th to see a demo of NetDocuments’ Trusted Cloud Platform integrated with the LINK secure container app.
View the recorded webinar here.
Peripatetic lawyers, take note from Friday, 1/5/2018, in the Washington Post:
“U.S. customs agents conducted 60 percent more searches of travelers’ cellphones, laptops and other electronic devices during the government’s 2017 fiscal year, according to statistics released Friday by U.S. Customs and Border Protection (CBP).
The agency said it searched 30,200 devices but the inspections affected only 0.007 percent of the 397 million travelers — including American citizens as well as foreign visitors — who arrived from abroad during the 12-month period that ended Sept 30.”1
Whaling, hacking, Panama Papers. Security exploits targeted at law firms are front page news this year.
By Seth Hallem, Mobile Helix CEO and co-founder
On March 28th, the Department of Justice confirmed that it had successfully unlocked the San Bernardino shooter’s iPhone 5C without Apple’s assistance. On that same day, the US government moved to vacate a California court order that had attempted to force Apple to assist in the decryption of the device. While the legal maneuverings are fascinating in their own right, the conclusion leads to an even more fascinating technology discussion – how did the FBI crack the iPhone, and what are the implications of this successful hack? Continue reading