Yearly Archives: 2017

Gifts That Snoop? The Internet of Things Is Wrapped in Privacy Concerns

But security experts warn that there’s little oversight of what data these products can collect—or how it’s traded to marketers and protected from hackers. Before you connect new devices to your home network, experts say it’s important to understand the trade-offs, and how to stay safe. “We’re still in the wild, wild west,” says John […]

How Uber Is Going to Change the C-Suite in 2018

Going forward, this will change. Given the beleaguered state of business networks, CISOs clearly require more power and influence to make a difference. And, in fact, this trend is already under way. Speaking about security at big financial companies, John Dickson, principal at Denim Group, an application security consultancy, told me that CISOs have started elbowing […]

What Sort of Testing Do My Applications Need?

As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to. This is typically done through application security testing – identifying vulnerabilities in an application so that you can make risk-based decisions about mitigation and resolution. […]

PODCAST: Will 2018 be the year of the CISO?

“What this means is that now the CISO has more hard core business rationale for spending,” Dickson opined. “In the good old days CISOs would say, ‘We have to do this or we might get hacked.’ It was it was an abstract threat and risk that, candidly, most execs had a hard time quantifying. “Now […]

White House weighs North Korean cyber retaliation

“The nuclear side, shooting a rocket over Japan — they’re all very in-your-face activities,” said John Dickson, principal of the Denim Group and a former U.S. Air Force officer. If North Korea wanted to make a point or exert power in a deniable way, Dickson said, the U.S. could expect to see more hacking activity. […]

DHS: Cyberattack greater threat than bombs

“They are definitely in the B team, but they have capabilities nonetheless,” said John Dickson, a cybersecurity expert and principal at Denim Group Ltd., a company in the business of software security. Dickson had been tracking North Korean cyber activity for years. “I characterize (North Korea) as having increasing capability – they are nowhere near […]