SHARED INTEL: VCs pumped $21.8 billion into cybersecurity in 2021 — why there’s more to come
At the start of this year, analysts identified a number of trends driving the growth of cybersecurity. Among them: an expanding digital footprint, growing attack surfaces, and increasing government regulation. Related: Taking API proliferation seriously Last year saw an unprecedented … (more…) ... Read More
GUEST ESSAY: The Top 5 online privacy and data security threats faced by the elderly
What is it about the elderly that makes them such attractive targets for cybercriminals? A variety of factors play a role. Related: The coming of bio-digital twins Unlike many younger users online, they may have accumulated savings over their lives … (more…) ... Read More
GUEST ESSAY – The role of automation in keeping software from malicious, unintended usage
Writing a code can be compared to writing a letter. Related: Political apps promote division When we write a letter, we write it in the language we speak — and the one that the recipient understands. When writing a code, … (more…) ... Read More
RSAC insights: ‘CAASM’ tools and practices get into the nitty gritty of closing network security gaps
Reducing the attack surface of a company’s network should, by now, be a top priority for all organizations. Related: Why security teams ought to embrace complexity As RSA Conference 2022 gets underway today in San Francisco, advanced systems to help … (more…) ... Read More
RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks
Pity the poor CISO at any enterprise you care to name. Related: The rise of ‘XDR’ As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. Many are … (more…) ... Read More
RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares
bacohido | | Best Practices, For Consumers, For Technologists, Podcasts, RSA Podcasts, Steps forward, Top Stories
The zero trust approach to enterprise security is well on its way to mainstream adoption. This is a very good thing. Related: Covid 19 ruses used in email attacks At RSA Conference 2022, which takes place next week in … (more…) ... Read More
RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’
It’s not difficult to visualize how companies interconnecting to cloud resources at a breakneck pace contribute to the outward expansion of their networks’ attack surface. Related: Why ‘SBOM’ is gaining traction If that wasn’t bad enough, the attack surface companies … (more…) ... Read More
RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains
Third-Party Risk Management (TPRM) has been around since the mid-1990s – and has become something of an auditing nightmare. Related: A call to share risk assessments Big banks and insurance companies instilled the practice of requesting their third-party … (more…) ... Read More
RSAC insights: ‘SaaS security posture management’ — SSPM — has emerged as a networking must-have
Companies have come to depend on Software as a Service – SaaS — like never before. Related: Managed security services catch on From Office 365 to Zoom to Salesforce.com, cloud-hosted software applications have come to make up the nerve center … (more…) ... Read More
RSAC insights: Concentric AI directs Google’s search techniques towards locking down data sprawl
bacohido | | For Consumers, For Technologists, Podcasts, Privacy, RSA Podcasts, Steps forward, Top Stories, Uncategorized
In order to extract value from the Internet, data sprawl first must get reined in. This has always been the case. Related: Equipping SOCs for the long haul What good is connecting applications, servers and networks across the public cloud … (more…) ... Read More