5 steps to respond to a data breach

April 2, 2021 | Bernard Brode
Bernard Brode

Bernard Brode

Bernard Brode is a product researcher at Microscopic Machines and eternally curious about where the intersection of AI, cybersecurity, and nanotechnology will eventually take us.

April 2, 2021 | Bernard Brode

5 steps to respond to a data breach

This blog was written by an independent guest blogger. You’ve just been breached. What do you do next? Depending on personality, preparation, and ability under crisis, there are a variety of responses to choose from, some effective and some not. Hopefully, you’re the rare breed who plans in advance how to respond. Even better if this…

March 15, 2021 | Bernard Brode

Is automated vulnerability scanning the best way to secure smart vehicles?

This blog was written by an independent guest blogger. To those who pay attention to such things, it seems like a new vulnerability in smart car systems is found every week. In 2020, the numbers beat all previous years. The inescapable conclusion is that smart cars are now among the favorite targets of hackers and APT (Advanced Persistent Threat) actors. One…

Get the latest security news in your inbox.

Subscribe via email

RSS

February 4, 2021 | Bernard Brode

Rooting out the cybersecurity risk in your CI/CD pipeline

This blog was written by an independent guest blogger. When it comes to productivity, agility, and efficiency - continuous integration/continuous delivery (CI/CD) pipelines are great. When it comes to ensuring cybersecurity, they leave a lot to be desired. In fact, and especially given the popularity of CI/CD pipelines now, securing continuous environments might turn into the most…

December 22, 2020 | Bernard Brode

‘Tis the season for session hijacking - Here’s how to stop it

This blog was written by an independent guest blogger. The air is getting colder, leaves are falling from the trees, and people everywhere are settling in for the holiday season. Which means one thing - increased cybersecurity vulnerability. With more aspects of the winter holidays relegated to online platforms this year, people everywhere are more susceptible to cyberattacks. Luckily, there…

November 5, 2020 | Bernard Brode

Best data security practices when offboarding employees

This blog was written by an independent guest blogger. In times long gone, disgruntled former employees could only do so much damage to your company, and relatively little at all to your data security. In the fast-moving world of the 21st century, however, it’s a different story. Costly data breaches and devastating thefts have been undertaken in recent…

September 2, 2020 | Bernard Brode

How Covid-19 has increased vulnerabilities in Industrial Control Systems

This blog was written by an independent guest blogger. By now, most are aware that the Covid-19 pandemic has led to a spike in cyberattacks. This sharp increase in malicious activity related to COVID has taken the typical form of adversaries seeking to benefit financially, gain unauthorized access to networks for immediate and long-term strategic benefit, and spread misinformation with…

August 3, 2020 | Bernard Brode

Digital signatures security explained

This blog was written by an independent guest blogger. Digital signatures have been around for decades, but recent events have put them back in the spotlight. They were heralded as the future of cybersecurity as far back as 1999, but in the intervening years came to be somewhat taken for granted by security engineers. Not any longer: the massive move to…

June 23, 2020 | Bernard Brode

What quantum cryptography means for cybersecurity

This blog was written by an independent guest blogger. Just as cybersecurity professionals are getting used to the possible implications of quantum computers, a new front opens in the quantum arms race: using quantum computers for encryption. Though quantum computers remain a largely theoretical threat, some researchers are already working on ways to protect systems against the exponential increase in…