Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
CISOs climb into the hot seat by Byron Acohido

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal ...
The case for 'shift left' deep testing in software development by Byron Acohido

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of ...
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
The case for tracking 'privileged activities' by Byron Acohido

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...
Making Windows Active Directory security resilient by Byron Acohido

NEW TECH: Semperis introduces tools to improve security resiliency of Windows Active Directory

Ransomware continues to endure as a highly lucrative criminal enterprise.Ransomware hacking groups extorted at least $144.35 million from U.S. organizations between January 2013 and July 2019. That’s the precise figure recently disclosed ...
Machine identities under attack by Byron Acohido

SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

In one sense, digital transformation is all about machines.Related: Authenticating IoT devicesPhysical machines, like driverless vehicles and smart buildings; but, even more so, virtual machines. I’m referring to the snippets of “microservice” ...
The rapid advance of mobile security by Byron Acohido

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

We’ve come to rely on our smartphones to live out our digital lives, both professionally and personally.When it comes to securing mobile computing devices, the big challenge businesses have long grappled with ...
How 'NDR' can secure 'IoT' by Byron Acohido

MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap

There’s no stopping the Internet of Things now.Related: The promise, pitfalls of IoTCompanies have commenced the dispersal of IoT systems far and wide. Data collected by IoT devices will increasingly get ingested ...
SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

Application programming interface. API. It’s the glue holding digital transformation together.Related: A primer on ‘credential stuffing’APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere ...