Author: TK Keanini

TK Keanini brings nearly 25 years of network and security experience to the CTO role. He is responsible for leading Lancope’s evolution toward integrating security solutions with private and public cloud-based computing platforms. TK is also responsible for developing the blueprint and solution that will help Lancope’s customers securely benefit from the promise of software-defined networking (SDN). Prior to joining Lancope, Keanini served as CTO for nCircle, driving product innovation that defined the vulnerability management and configuration compliance market. Before joining nCircle, he served as Vice President of Network Services for Morgan Stanley Online, where he built and secured a highly available online trading system. Previously, Keanini was a systems engineer at Cisco, advising top financial institutions on the design and architecture of their data networking infrastructure. Keanini is a Certified Information Systems Security Professional (CISSP).

When your everyday life is all about information security, you start to see patterns that may not be so obvious to others. Each year, I take my best shot at describing these trends and making predictions for the coming year. In this annual article, we also go back retrospectively and review the predictions we made the previous year to see how clear or cloudy our crystal ball was in helping us create our forecast. 2015 Retrospective We predicted 4 major trends for 2015: Muleware, re-authentication exploitation, ransomware expansion and targeted extortionware. Conservatively, I’m going to say that we certainly got…

Read More

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders. The effects of insider threats are simply too big to ignore. In the most recent year on record, U.S. organizations suffered $40 billion in losses due to employee theft and fraud. According to a report by the market research company Forrester, 46 percent of nearly 200 technology decision-makers reported internal incidents as the most common cause of the breaches they experienced in the past…

Read More

All one has to do is check their Twitter account to witness the constant stream of reported cyber security incidents happening globally. I explicitly say “reported” because individuals, supply chain partners, and businesses everywhere are at some point realizing they have been compromised and only a small percentage report this publicly. Often the only way through is the “hard way” so we can gain a better understanding of how to be more ready and more intelligent about this threat we all face. Information security practitioners have always said that security is not a thing, but a process. The term Incident…

Read More

Every year seems to come with record-breaking amounts of new malware, and a few surprise attacks that nobody saw coming. It seems like 2014 has been filled with more than its fair share of major data breaches–beginning with the remnants of the fallout of the Target breach from late 2013, all the way up to the recent epic breach of Sony Pictures. The up side–even if it’s an after-the-fact trial-by-fire–is that organizations are quickly learning the importance of two-factor authentication, and streamlining incident detection and response processes. The rise of the Internet-of-Things (IoT), 3D printers, tracking devices, and continued shift…

Read More