Tested to Work, Not Tested to Secure: Why Critical Crypto Bugs Hide for Years

Author(s):

Gurdeep Gill, Software Engineer Technical Leader, CISCO Systems

Tested to Work, Not Tested to Secure

Heartbleed (CVE-2014-0160) lurked in OpenSSL for two years. These simple missing bounds check exposed private keys across hundreds of thousands of servers. OpenSSL had passed its tests. The encryption worked correctly. But those tests never checked if the code was secure. This isn’t isolated. Critical bugs persist in production cryptographic libraries for years despite protecting … Read more

Machine Learning in Threat Detection: What Actually Works

Author(s):

Gurdeep Gill, Software Engineer Technical Leader, CISCO Systems

machine-learning-in-threat-detection

December 2020. FireEye discovers they’ve been breached. The attackers had been inside for months. They used legitimate credentials. No malware signatures. No known indicators of compromise. Traditional security tools saw nothing wrong. This was the SolarWinds attack, one of the most sophisticated supply chain compromises in history. It affected 18,000 organizations including Fortune 500 companies … Read more

CMMC Isn’t Just for the DoD: The Ripple Effect Across All Industries

Author(s):

Jacqui Magnes, CEO and Owner, COMSO, Inc. dba CISPOINT

CISPOINT CMMC

When most leaders hear “CMMC,” their minds immediately jump to the Department of War.  This is understandable since the Cybersecurity Maturity Model Certification was created to protect sensitive DoW information by raising cybersecurity standards among its contractors. But here’s what many don’t realize: CMMC isn’t stopping at the Pentagon’s doorstep. Its influence is already rippling … Read more

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Author(s):

Gurdeep Gill, Software Engineer Technical Leader, CISCO Systems

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity is undergoing an unprecedented transformation. AI’s growing adaptability now enables autonomous, evasive attacks. Simultaneously, quantum computers draw ever closer, capable of shattering our strongest encryption. These dual forces fundamentally reshape national security. Our nations now live and breathe through vast, interconnected networks, making every critical function inherently digital. This profound reality elevates cybersecurity to … Read more

Best Backup and Disaster Recovery Tools for MSPs

Author(s):

Sergei Serdyuk, VP of Product Management, Nakivo

Best Backup and Disaster Recovery Tools

Managed Service Providers (MSPs) face constant pressure to safeguard client data against ever-growing threats such as ransomware, hardware failures and accidental deletions. Without a solid backup and disaster recovery strategy, even a minor incident can lead to costly downtime and loss of trust. The right tools ensure data protection and streamline the recovery processes for … Read more

The Darkest of the Dark: The 764 Network

Author(s):

The Darkest of the Dark

In recent years a disturbing trend has emerged in the online world—violent and exploitative networks targeting vulnerable youth.  In today’s world of technology, children are more connected than ever before.  With access to social media platforms, online games, and messaging apps, the internet offers countless opportunities for education and entertainment.  However, these same platforms have … Read more

Is Your Password in the Green? Modern Tips for Maximum Security

Author(s):

password in the green

Passwords have become an everyday aspect of modern life, serving as the primary method for securing access to countless digital platforms and services. People rely on passwords multiple times each day, whether they are unlocking smartphones, logging into email or social media accounts, accessing online banking and work systems, or shopping on websites.  As our … Read more

The CSO Conference & Awards: A Brief History

Author(s):

CSO Brief History

The CSO Conference & Awards has evolved into a premier event for cybersecurity professionals and leaders. Formerly known as CSO50, this conference has a rich history of recognizing excellence and innovation in the field of cybersecurity. Origins and Evolution Welcome to the reimagined CSO Conference & Awards, fueled by a brand-new name and an expanded … Read more

Blockchain Technology: From Hype to The Future

Author(s):

Blockchain Technology

The mysterious blockchain technology. Well, it was mysterious. In fact, at one point, it was futuristic. And there was so much hype around it, yet so many differences, that nobody really trusted it. But what happened? Blockchain technology moved from hype to the future. It’s something most people know about, understand, and are interested in … Read more