89 Posts

Mark Samuels

Tech Journalist

Mark Samuels is an experienced business technology journalist with an outstanding track record in research. He specializes in the role of chief information officers (CIOs) and is adept at helping executives understand the business benefits of complex technologies. Key areas of interest include innovation, digital transformation, cloud computing, mobility, information security, ecommerce and big data. Mark has written articles for national newspapers, including The Guardian, The Times and The Sunday Times. He has also produced features and columns for a range of IT trade publications, such as Computer Weekly, ZDNet, Tech Republic, IT Pro, Channel Pro, CBR and The Register.

Written By Mark Samuels

Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification

IT decision-makers need to evolve beyond two-factor authentication and design new ways to make the user verification process intelligent and risk-aware.

Security Patches Help IT Managers Address Microsoft Vulnerability

Microsoft released security patches to deal with a 17-year-old flaw that could be exploited to remotely initiate malicious code on all Windows versions.

Public Key Infrastructure Concerns Raise Questions Over Internet Authentication System

According to a recent paper, threat actors are abusing the code signing process associated with public key infrastructure and evading antivirus detection.

Business Leaders Must Wake Up to the Risk of Shadow IT

According to a recent survey by Symantec, the risk posed by shadow IT is growing, and CIOs are in denial about the scale of the problem.

Photo-Based Pixie 2FA System Takes Authentication to a New Dimension

Researchers at Florida International University and Bloomberg have generated a new 2FA system that relies on an individual taking a picture of an object.

Security Vulnerability Puts Linux Kernel at Risk

A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.

RSA Key Insecurity Places Business Data at Risk

Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.

Sloppy Business Behavior to Blame for Cloud Security Leaks, Survey Reveals

A recent survey by cloud security firm RedLock attributed the rise in cloud data leaks to inadequate policies, lack of compliance and other poor practices.

Cybercriminals Use Legitimate VMware Binary to Create New Malware Threat

Cisco Talos discovered a new banking Trojan that exploits an authentic VMware binary to hide its malicious activities from security researchers.

As Cybersecurity Awareness Increases, Information Sharing Lags, Survey Shows

Although more than three-quarters of company directors reported a rise in cybersecurity awareness, only one-quarter actively share threat information.