New Tech

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?
Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security. We began the new millennium with on-premises data centers supporting servers and desktops ...

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment
Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF
The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.Related: ‘Business logic’ hacks on the riseConsider that we began this century relying on ...

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures
Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications
bacohido | | Best Practices, For Technologists, New Tech, Podcasts, Q & A, RSA Podcasts, Top Stories
Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks
It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’
Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps
DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.Related: A firewall for microservicesDevSecOps arose to insert security ...

Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks
Defending business networks isn’t getting any easier. Companies can have the latest, greatest perimeter defenses, intrusion detection systems and endpoint protections – and attackers will still get through. Just ask Equifax or ...

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology
Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.I’ve written about the how SIEMs ingest log and event data from all across hybrid ...