Why achieving iO -- 'indistinguishability obfuscation' -- is so crucial by Byron Acohido

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

Most of time we take for granted the degree to which fundamental components of civilization are steeped in mathematics.Everything from science and engineering to poetry and music rely on numeric calculations. Albert ...
The mainstreaming of biometrics-enabled access by Byron Acohido

SHARED INTEL: Coming soon — ‘passwordless authentication’ as a de facto security practice

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication.But now, at long last, we’re on the brink of eliminating passwords altogether, ...

Chris Eng Talks about the State of Software Security Report

TechSpective Podcast Episode 050 “Every company is a software company.” That is the quote that kicks off the Executive Summary page of the latest State of Software Security Report from Veracode. This ...
Protecting hybrid cloud networks end-to-end by Byron Acohido

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...
The case for focussing on application security by Byron Acohido

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.Related: ‘Business logic’ hacks on the riseConsider that we began this century relying on ...

Tom Garrison Discusses Preventing Exploits with Intel CET

TechSpective Podcast Episode 049 Malware is a massive problem that costs businesses around the world billions of dollars every year. Much of the effort to fight malware is a simple game of ...
Everything you should know about API exposures by Byron Acohido

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...

DJ Sampath Chats about the COVID-19 Pandemic and Business Email Compromise

TechSpective Podcast Episode 048 Hello. It’s been a while. In my defense, time is just a construct and it seems to have mostly lost meaning–at least for me–during the COVID-19 pandemic quarantine ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
CISOs climb into the hot seat by Byron Acohido

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal ...