3 Benefits of ‘Zero Trust’ Cybersecurity for Protecting Customer Information

Ayodeji Onibalusi is reporting in Entrepreneur:

“Cybersecurity threats can come from both outside, as well as inside, an organization. Threats can also start from a single point and spread out. This is why adopting a “never trust, always verify” approach to security can help organizations shield against the bad guys in a more robust manner.”

https://www.entrepreneur.com/article/319825?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+entrepreneur%2Flatest+%28Entrepreneur%29

U.S. Mobile Giants Want to be Your Online Identity

Brian Krebs is reporting that the four major U.S. wireless carriers today detailed a new initiative that may soon let Web sites eschew passwords and instead authenticate visitors by leveraging data elements unique to each customer’s phone and mobile subscriber account, such as location, customer reputation, and physical attributes of the device. Here’s a look at what’s coming, and the potential security and privacy trade-offs of trusting the carriers to handle online authentication on your behalf.

https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/

Using Hacked IoT Devices to Disrupt the Power Grid

Bruce Schneier is reporting that an Internet of Things (IoT) botnet of high wattage devices — such as air conditioners and heaters — gives a unique ability to adversaries to launch large-scale coordinated attacks on the power grid.

https://www.schneier.com/blog/archives/2018/09/using_hacked_io.html