Ben Carr Chats about 2021 and the Evolving Role of the CISO
Every year around this time, tech and cybersecurity media take a look back at the year that is winding down, and experts and pundits make predictions about the year ahead. It is a holiday tradition. From a cybersecurity perspective, it generally feels like the holiday we are celebrating is Ground ... Read More
Fighting Financial Fraud with Consilient and Intel SGX
Intel is a sponsor of TechSpective When it comes down to it, money is involved in virtually every form of crime and cybercrime. In many cases, money itself is the primary target, but even when it isn’t, it still plays a vital and central role. Criminals leverage technology to launder ... Read More
Innovative Encryption Solutions to Help Prevent Side Channel Attacks
Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers know that too—which is why they work diligently to find ways to steal secret encryption keys and digital ... Read More
Embracing SaaS Productivity Without Sacrificing Security
We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital transformation at least had it on their radar with plans to start soon—and then the COVID-19 pandemic hit ... Read More
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams against each other in a race to infiltrate or compromise a target or opponent and achieve victory by ... Read More
Chris Eng Talks about the State of Software Security Report
TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This is Volume 11 of the report, with a focus on looking ahead to identify how developers can continue ... Read More
Cybereason Backs Its Protection with $1 Million Breach Protection Warranty
Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver on that promise to back it up with cash. Cybereason today unveiled The Cybereason Breach Protection Warranty that ... Read More
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was “A CISO’s Perspective on Zero Trust”—a discussion between Myrna Soto, chief strategy and trust officer for Forcepoint, and ... Read More
Forcepoint Focuses on Relevance and Importance of Zero Trust Today
The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies can effectively protect against emerging threats. Forcepoint hosted a virtual conference today—Cyber Voices Zero Trust Summit—to discuss the ... Read More
Qualys Applies the Concept of EDR Across Your Whole Environment
Qualys recently made its Multi-Vector EDR offering generally available. The product takes the idea of endpoint detection and response (EDR) and applies it in a more holistic way that extends beyond the endpoint to provide additional context and insight. When I first wrote about Qualys Multi-Vector EDR, I described it, ... Read More
