SHARED INTEL: VCs pumped $21.8 billion into cybersecurity in 2021 — why there’s more to come

SHARED INTEL: VCs pumped $21.8 billion into cybersecurity in 2021 — why there’s more to come

At the start of this year, analysts identified a number of trends driving the growth of cybersecurity. Among them: an expanding digital footprint, growing attack surfaces, and increasing government regulation. Related: Taking API proliferation seriously Last year saw an unprecedented … (more…) ... Read More
GUEST ESSAY: The Top 5 online privacy and data security threats faced by the elderly

GUEST ESSAY: The Top 5 online privacy and data security threats faced by the elderly

What is it about the elderly that makes them such attractive targets for cybercriminals? A variety of factors play a role. Related: The coming of bio-digital twins Unlike many younger users online, they may have accumulated savings over their lives … (more…) ... Read More
GUEST ESSAY – The role of automation in keeping software from malicious, unintended usage

GUEST ESSAY – The role of automation in keeping software from malicious, unintended usage

Writing a code can be compared to writing a letter. Related: Political apps promote division When we write a letter, we write it in the language we speak — and the one that the recipient understands. When writing a code, … (more…) ... Read More
An introduction to CAASM - 'cyber assets attack surface management' by Byron Acohido

RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps

Reducing the attack surface of a company’s network should, by now, be a top priority for all organizations. Related: Why security teams ought to embrace complexity As RSA Conference 2022 gets underway today in San Francisco, advanced systems to help … (more…) ... Read More
RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

Pity the poor CISO at any enterprise you care to name. Related: The rise of ‘XDR’ As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. Many are … (more…) ... Read More
RSAC 2022: How Votiro sanitizes weaponized files circulating in the wild by Byron Acohido

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The zero trust approach to enterprise security is well on its way to mainstream adoption. This is a very good thing. Related: Covid 19 ruses used in email attacks At RSA Conference 2022, which takes place next week in … (more…) ... Read More
RSAC 2022: ReversingLabs granularly checks code to discover tampering by Byron Acohido

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

It’s not difficult to visualize how companies interconnecting to cloud resources at a breakneck pace contribute to the outward expansion of their networks’ attack surface. Related: Why ‘SBOM’ is gaining traction If that wasn’t bad enough, the attack surface companies … (more…) ... Read More
RSAC 2022 - Cyber GRX enriches third-party risk profiling techniques by Byron Acohido

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

Third-Party Risk Management (TPRM) has been around since the mid-1990s – and has become something of an auditing nightmare. Related: A call to share risk assessments Big banks and insurance companies instilled the practice of requesting their third-party … (more…) ... Read More
RSAC 2022: Adaptive Shield's SSPM solution eliminates SaaS misconfigurations by Byron Acohido

RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have

Companies have come to depend on Software as a Service – SaaS — like never before. Related: Managed security services catch on From Office 365 to Zoom to Salesforce.com, cloud-hosted software applications have come to make up the nerve center … (more…) ... Read More
RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl

In order to extract value from the Internet, data sprawl first must get reined in. This has always been the case. Related: Equipping SOCs for the long haul What good is connecting applications, servers and networks across the public cloud … (more…) ... Read More

Secure Guardrails