NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security. We began the new millennium with on-premises data centers supporting servers and desktops ...
Protecting hybrid cloud networks end-to-end by Byron Acohido

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...
The case for focussing on application security by Byron Acohido

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.Related: ‘Business logic’ hacks on the riseConsider that we began this century relying on ...
Everything you should know about API exposures by Byron Acohido

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
The case for tracking 'privileged activities' by Byron Acohido

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...
Automating security in DevOps by Byron Acohido

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.Related: A firewall for microservicesDevSecOps arose to insert security ...
A primer on 'Network Traffic Analysis' by Byron Acohido

Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

Defending business networks isn’t getting any easier. Companies can have the latest, greatest perimeter defenses, intrusion detection systems and endpoint protections – and attackers will still get through. Just ask Equifax or ...
NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP  — technology

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about the how SIEMs ingest log and event data from all across hybrid ...