Everything you should know about API exposures by Byron Acohido

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
The case for tracking 'privileged activities' by Byron Acohido

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...
Automating security in DevOps by Byron Acohido

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.Related: A firewall for microservicesDevSecOps arose to insert security ...
A primer on 'Network Traffic Analysis' by Byron Acohido

Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

Defending business networks isn’t getting any easier. Companies can have the latest, greatest perimeter defenses, intrusion detection systems and endpoint protections – and attackers will still get through. Just ask Equifax or ...
NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP  — technology

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about the how SIEMs ingest log and event data from all across hybrid ...
NEW TECH:  Start-up QuoLab enters emerging  ‘Security Operations Platform’ — SOP  — space

NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about the how SIEMs ingest log and event data from all across hybrid ...
Dealing with 'dangling buckets' by Byron Acohido

NEW TECH: WhiteHat Security tackles ‘dangling buckets,’ other new web app exposures

WhiteHat Security got its start some 17 years ago in Silicon Valley to help companies defend their public-facing websites from SQL injection and cross-site scripting hacks.Related: Mobile apps are full of vulnerabilitesBoth ...
NEW TECH: Can MPC — Multi Party Computation — disrupt encryption,  boost cloud commerce?

NEW TECH: Can MPC — Multi Party Computation — disrupt encryption, boost cloud commerce?

Encryption is a cornerstone of digital commerce. But it has also proven to be a profound constraint on the full blossoming of cloud computing and the Internet of Things.Related: A ‘homomorphic-like’ encryption ...