Innovative Encryption Solutions to Help Prevent Side Channel Attacks

Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers know that too—which is why they work diligently to find ways to steal secret encryption keys and digital ... Read More

Embracing SaaS Productivity Without Sacrificing Security

We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital transformation at least had it on their radar with plans to start soon—and then the COVID-19 pandemic hit ... Read More

Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms

The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams against each other in a race to infiltrate or compromise a target or opponent and achieve victory by ... Read More

Chris Eng Talks about the State of Software Security Report

TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This is Volume 11 of the report, with a focus on looking ahead to identify how developers can continue ... Read More
We are the Defenders. The first to your fight.

Cybereason Backs Its Protection with $1 Million Breach Protection Warranty

Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver on that promise to back it up with cash. Cybereason today unveiled The Cybereason Breach Protection Warranty that ... Read More

Defending an Increasingly Blurred Perimeter with ZTNA and SASE

Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was “A CISO’s Perspective on Zero Trust”—a discussion between Myrna Soto, chief strategy and trust officer for Forcepoint, and ... Read More

Forcepoint Focuses on Relevance and Importance of Zero Trust Today

The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies can effectively protect against emerging threats. Forcepoint hosted a virtual conference today—Cyber Voices Zero Trust Summit—to discuss the ... Read More

Qualys Applies the Concept of EDR Across Your Whole Environment

Qualys recently made its Multi-Vector EDR offering generally available. The product takes the idea of endpoint detection and response (EDR) and applies it in a more holistic way that extends beyond the endpoint to provide additional context and insight. When I first wrote about Qualys Multi-Vector EDR, I described it, ... Read More

Hallway Con and Hacking Travel Technology

The COVID-19 pandemic has brought much of the world to its knees and sent ripples across all regions and industries. One consequence of the pandemic has been the elimination of large gatherings—meaning no in-person conferences or conventions. Events like Black Hat and Microsoft Inspire made the shift to transition to ... Read More

Project STAMINA Uses Deep Learning for Innovative Malware Detection

You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into images for analysis at scale. Project STAMINA—an acronym for STAtic Malware-as-Image Network Analysis—converts malware samples into two-dimensional grayscale ... Read More