Innovative Encryption Solutions to Help Prevent Side Channel Attacks
Encryption is an essential element of effective cybersecurity and data protection. Only systems or individuals with the correct encryption keys are able to decipher and view the encrypted data. Of course, attackers know that too—which is why they work diligently to find ways to steal secret encryption keys and digital ... Read More
Embracing SaaS Productivity Without Sacrificing Security
We are living in very interesting times. Organizations of all sizes and across all industries have been migrating to the cloud for years. Those that were not already actively engaged in digital transformation at least had it on their radar with plans to start soon—and then the COVID-19 pandemic hit ... Read More
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams against each other in a race to infiltrate or compromise a target or opponent and achieve victory by ... Read More
Chris Eng Talks about the State of Software Security Report
TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This is Volume 11 of the report, with a focus on looking ahead to identify how developers can continue ... Read More
Cybereason Backs Its Protection with $1 Million Breach Protection Warranty
Every security vendor believes that their product solves a problem and helps customers protect against a breach, exploit, or compromise. However, not every vendor is confident enough in their ability to deliver on that promise to back it up with cash. Cybereason today unveiled The Cybereason Breach Protection Warranty that ... Read More
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was “A CISO’s Perspective on Zero Trust”—a discussion between Myrna Soto, chief strategy and trust officer for Forcepoint, and ... Read More
Forcepoint Focuses on Relevance and Importance of Zero Trust Today
The world of cybersecurity is constantly changing—technology is continuously evolving and the threat landscape is constantly shifting and expanding. Organizations need to adapt as well to ensure their security tools and policies can effectively protect against emerging threats. Forcepoint hosted a virtual conference today—Cyber Voices Zero Trust Summit—to discuss the ... Read More
Qualys Applies the Concept of EDR Across Your Whole Environment
Qualys recently made its Multi-Vector EDR offering generally available. The product takes the idea of endpoint detection and response (EDR) and applies it in a more holistic way that extends beyond the endpoint to provide additional context and insight. When I first wrote about Qualys Multi-Vector EDR, I described it, ... Read More
Hallway Con and Hacking Travel Technology
The COVID-19 pandemic has brought much of the world to its knees and sent ripples across all regions and industries. One consequence of the pandemic has been the elimination of large gatherings—meaning no in-person conferences or conventions. Events like Black Hat and Microsoft Inspire made the shift to transition to ... Read More
Project STAMINA Uses Deep Learning for Innovative Malware Detection
You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into images for analysis at scale. Project STAMINA—an acronym for STAtic Malware-as-Image Network Analysis—converts malware samples into two-dimensional grayscale ... Read More

