How 'clean code' reinforces DevOps, CI/CD by Byron Acohido

Black Hat Fireside Chat: Why using ‘Clean Code’ is paramount in speedy software development

Clean Code’ is a simple concept rooted in common sense. This software writing principle cropped up some 50 years ago and might seem quaint in today’s era of speedy software development. Related: ...
Flexxon makes secure SSD drives available in laptops by Byron Acohido

Black Hat Fireside Chat: Flexxon introduces hardened SSD drives as a last line defense

Creating ever smarter security software to defend embattled company networks pretty much sums up the cybersecurity industry. Related: The security role of semiconductors Cutting against the grain, Flexxon, a Singapore-based supplier of ...
Crowdsourced threat intelligence comes of age by Byron Acohido

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play

From Kickstarter to Wikipedia, crowdsourcing has become a part of everyday life. Sharing intel for a greater good Now one distinctive type of crowdsourcing — ethical hacking – is positioned to become ...
Deploying 'enterprise browsers' as the last mile defense by Byron Acohido

Black Hat Fireside Chat: How ‘enterprise browsers’ serve as a checkpoint to stop ChatGPT leakage

For a couple of decades now, the web browser has endured in workplace settings as the primary employee-to-Internet interface. It’s really just assumed to be a given that a browser built for ...
Black Hat Fireside Chat: How to achieve API security — as AI-boosted attacks intensify

Black Hat Fireside Chat: How to achieve API security — as AI-boosted attacks intensify

API security has arisen as a cornerstone of securing massively interconnected cloud applications. At Black Hat USA 2023, I had a great discussion about API security with Data Theorem COO Doug Dooley ...
Directing penetration testing at attack surface management by Byron Acohido

Black Hat Fireside Chat: Horizon3.ai makes a strong case for continuous, self-service pentesting

LAS VEGAS — Penetration testing, traditionally, gave businesses a nice, pretty picture of their network security posture — at a given point in time. Related: Going on the security offensive Such snapshots ...
How 'ITDR' beefs up security of privileged access by Byron Acohido

Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’

The rise of the remote workforce, post Covid-19, did nothing to make the already difficult task of doing Identity and Access Management (IAM) any easier for CISOs. Related: Exposing Shadow IT With ...
Taking a wartime approach to defending networks. by Byron Acohido

Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’

Penetration testing – pen tests – traditionally have been something companies might do once or twice a year. Related: Cyber espionage is on the rise Bad news is always anticipated. That’s the ...
Addressing the yin and yang of APIs by Byron Acohido

Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed

APIs have come to embody the yin and yang of our digital lives. Related: Biden moves to protect water facilities Without application programming interface, all the cool digital services we take for ...
Leveraging AI to carry out effective 'attack surface management' by Byron Acohido

Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

Short-handed cybersecurity teams face a daunting challenge. Related: ‘ASM’ is cybersecurity’s new centerpiece In an intensely complex, highly dynamic operating environment, they must proactively mitigate myriad vulnerabilities and at the same time ...