Robert Lemos, eWEEK

Robert Lemos

eWEEK

Nashua, NH, United States

Contact Robert

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • eWEEK
  • TechTarget
  • PCWorld
  • TechHive
  • Ars Technica

Past articles by Robert:

Five Basic Controls Companies Can Implement to Improve Data Hygiene

To improve system security, enterprises need to track hardware and software on their networks, address known vulnerabilities and take advantage of event logging, Defense Information Systems Agency → Read More

Overwhelmed by security data? Science to the rescue

Done right, data analytics and machine learning can help companies reduce the amount of data they need to parse and highlight potential threats. However, experts warn that the improper use of security data science can overwhelm information security analysts. → Read More

Five Security Defenses Every Containerized Application Needs

Misconfigurations and application vulnerabilities continue to undermine security the security of containerized applications that companies are deploying in the cloud. Here are five ways to secure them. → Read More

How DDoS Attacks Techniques Have Evolved Over Past 20 Years

Security experts say there is no evidence that Distributed Denial of Service attacks will hit an upper limit for bandwidth after two recent attacks crossed the 1 Tbps threshold. → Read More

7 Steps Administrators Should Take to Secure Mixed Cloud Environments

Most enterprises that have moved to the cloud are managing hybrid environments that retains keep much of the organization data assets in house. Here is a seven-step process for securing cloud and on-premises environments. → Read More

Attacks Exploit Microsoft Dynamic Data Exchange Protocol

Attackers are using Microsoft’s Dynamic Data Exchange protocol to download and install malware, according to security firm Zscaler. Microsoft has warned about the issue but does not consider it a vulnerability. → Read More

Cyber-Criminals Using Compromised RDP Servers to Anonymize Attacks

Security firm Flashpoint has discovered that cyber-criminals are likely breaking weak passwords rather than using software flaws to infect remote desktop protocol (RDP) servers that they use to anonymize their attacks. → Read More

Recent Cloud Issues Show Security Can Fail Dramatically

CloudBleed and TicketBleed hit different parts of the cloud infrastructure but show that cloud services can fail significantly. Will such Black Swan events turn off companies to the cloud? → Read More

States, Local Governments Need to Focus on Cyber-security, Experts Say

Cyber-security experts say states and local governments have a lot of obstacles to overcome when it comes to cyber-security. → Read More

Researchers Struggle to Determine True Cost of Data Breaches

Security researchers say data breach costs are difficult to estimate because breaches cause so many different types of losses that often go unreported. → Read More

IT Security Skills Gap More Harmful for SMBs Than Larger Firms

More than half of small businesses do not have regular access to security experts, and two-thirds have no training or certification in security. → Read More

How greed could destroy the ransomware racket

Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing. → Read More

All about your 'fullz' and how hackers turn your personal data into dollars

Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it. → Read More

How to keep USB thumb drive malware away from your PC

Research shows that, unless consumers know where the drive came from, they should return them, not plug them in. → Read More

What to ask your doctor, lawyer, and accountant about protecting your personal data

Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security. → Read More

Security Researchers Challenge Claims Data Breaches Increasing

While industry reports cite a rise in data breach incidents, academic researchers find few signs that the threat is getting significantly worse. → Read More

Cyber-Criminals to Ramp Up Malware Sophistication in 2016: Report

Criminals are becoming more organized by employing teams of developers that create more sophisticated malware that produces larger monetary gains, states an IBM report. → Read More

White House Budgets $19 Billion for New Cyber-Security Measures

The White House calls for more investment in protecting data and proposes to spend $19 billion this year on a variety of security initiatives, including educating consumers to use two-factor authentication. → Read More

Security attack? New defenses in 2016 escape compromise

Adversaries have learned a lot from defenses designed to detect advanced security attacks. Cyberthreats in 2016 require security and risk management. → Read More

Ransomware, Cyber-Spying Among Top Security Trends to Watch

We look at 10 trends, from ransomware incidents to malware-less attacks from nation-states, that will likely play a pivotal role in security in 2016. → Read More