The case for decentralizing encryption key storage by Byron Acohido

RSAC Fireside Chat: A breakthrough in securing cloud collaboration — decentralized key storage

Back in 2002, when I was a reporter at USA Today, I had to reach for a keychain fob to retrieve a single-use passcode to connect remotely to the paper’s publishing system ...
Unifying 'CNAPP' and 'EDR' to fully protect modern networks by Byron Acohido

RSAC Fireside Chat: Dealing with the return of computing workloads to on-premises datacenters

A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms Many companies, indeed, are shifting to cloud-hosted IT infrastructure, and beyond that, to containerization and ...
GUEST ESSAY:  Using generative AI to support  — not replace — overworked cybersecurity pros

GUEST ESSAY: Using generative AI to support — not replace — overworked cybersecurity pros

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: Leveraging human sensors Although AI has become a powerful ...
Putting a stop to ungoverned, unauthorized shadow access. by Byron Acohido

RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’

The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: ...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change NIST SP 800-207A (SP 207A), the next installment of Zero Trust ...
GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace

GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace

Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data breaches in which sensitive information is stolen. If a cyber-criminal uses you as a ...
Embedding mobile app security at the semiconductor layer by Byron Acohido

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. Related: Collateral damage ...
The case for shifting to containing, instead of blocking, ransomware by Byron Acohido

RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment

The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...