For Technologists

RSAC Fireside Chat: A breakthrough in securing cloud collaboration — decentralized key storage
Back in 2002, when I was a reporter at USA Today, I had to reach for a keychain fob to retrieve a single-use passcode to connect remotely to the paper’s publishing system ...

RSAC Fireside Chat: Dealing with the return of computing workloads to on-premises datacenters
A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms Many companies, indeed, are shifting to cloud-hosted IT infrastructure, and beyond that, to containerization and ...

GUEST ESSAY: Using generative AI to support — not replace — overworked cybersecurity pros
As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: Leveraging human sensors Although AI has become a powerful ...

RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’
The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration
Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: ...

RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints
bacohido | | Best Practices, For Consumers, For Technologists, Podcasts, RSA Podcasts, Steps forward, Top Stories
The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...

GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms
Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change NIST SP 800-207A (SP 207A), the next installment of Zero Trust ...

GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace
Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data breaches in which sensitive information is stolen. If a cyber-criminal uses you as a ...

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime
As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. Related: Collateral damage ...

RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment
The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...