Category: Cybersecurity

In this episode of the Futurum Tech Webcast, Futurum’s Shelly Kramer and Daniel Newman tackle the thorny topic of cybersecurity and the fact that security breaches are frequent, inevitable, expensive, and risky. Security has been a foundational layer within IT since the beginning of time, but it’s clear that it’s not working. There are many factors that contribute to this, and there are some nascent technology solutions, like Confidential Computing, that we think are going to play an important role in the not too distant future. This is one of a series of conversations we’ll have on this topic, and we’ve got a soon-to-publish research paper on the topic of Confidential Computing that you won’t want to miss.
In this episode of the Futurum Tech Webcast, host Shelly Kramer is joined by fellow analyst Fred McClimans for a conversation about some important cybersecurity news of the week that might’ve gotten lost as a result of horrible storms, power grid troubles, and lots of cold friends and colleagues. Their conversation focused on Clubhouse, the current darling of social apps Clubhouse and that fact that it’s powered by Agora, a Chinese-based company. Are their cybersecurity concerns there? Perhaps. We also explored the latest news from the US government on the SolarWinds hack, including startling information about its point of origin, and wrapped up with good news from Microsoft’s team around its investigation post SolarWinds hack. All in all, some great cybersecurity information and discussion that we think you’ll want to be a part of.
In this new episode of the Futurum Tech Webcast, analysts Shelly Kramer and Fred McClimans break down the Russian government hack of U.S. government agencies and the role that the three As played in this, and every cybersecurity event.
In this episode of the Futurum Tech Webcast – Women in Tech Interview Series, Futurum co-founder Shelly Kramer discusses cybersecurity and the IoT today with Riscure’s Jasmina Omic. Their conversation explores the foundation upon which PSA Certified was built and the benefits being PSA Certified brings to anyone developing and bringing to market IoT connected devices.
The REvil ransomware cyber gang claims to have attacked Brown-Forman, the owner of Jack Daniel’s and other popular liquor brands. The sophisticated ransomware gang claims to be holding 1TB of Brown-Forman corporate data for ransom, including employee information, pledging to leak the data in batches if the company does not respond to its demands. Brown-Forman has released few details about the attack, and claims “There are no active negotiations.”
The massive Twitter hack this past week was a wake-up call for many of the vulnerabilities our collective reliance on social media channels presents. Here is a short overview of the specifics that have been uncovered as a result of investigation by the FBI, lawmakers, cybersecurity experts and Twitter itself, as well as what the impact of a hack of this nature means for CISOs and their security vendor partners.
As we head into the new decade, the promise of IoT for CSPs is exciting. CSPs can redefine themselves as a smarter pipe, but must strive for quality service for future ecosystems like IoT. This market insight overview takes a look at the challenges CSPs face, some successful partnerships, and factors to consider moving forward.
Zoombombing is but one of the security concerns that Zoom is dealing with right now, as a lawsuit is filed in California citing a violation of the CCPA and the NY Attorney General is asking some tough questions about the company’s security practices. Zoom shares have skyrocketed since the beginning of the year and I am thrilled by their success. The path forward, however, relies on security. If the company is going to retain a customer base, especially that oh-so-valuable paid customer base that is what really allows companies to deliver shareholder value, then a proactive security first mindset is going to have to be the mantra they embrace and lead with. We’ll all be watching, and hoping they get this right.
With the launch of 2020, certain cybersecurity laws covering “smart” devices go into effect. As local (state) IoT cybersecurity regulation kicks in and federal regulation is looming, what does this mean for members of IoT ecosystems?
Exploring the impact of the IBM Hyper Protect accelerator, which was designed to drive innovation in security focused industries like finance and healthcare
Exabeam, a fast-growing startup in the SIEM (Security Information and Event Management) space is no real threat to Splunk, IBM. Here's why.
A security first mindset is critical for businesses of all sizes today. According to data from the 2018-2019 Global Application and Network Security Report, the average cost of a cyberattack (estimated) is more than $1 million, and for those organizations who calculate real costs rather than estimate the impact of a breach, the cost is in the $1.67M range. Not at all surprising that a company like Auth0, focusing on identity authentication, has reached a billion dollar valuation. More to come on that front, for sure.I

Thank you, we received your request, a member of our team will be in contact with you.