Protecting hybrid cloud networks end-to-end by Byron Acohido

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to ...
The case for focussing on application security by Byron Acohido

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.Related: ‘Business logic’ hacks on the riseConsider that we began this century relying on ...

Tom Garrison Discusses Preventing Exploits with Intel CET

TechSpective Podcast Episode 049 Malware is a massive problem that costs businesses around the world billions of dollars every year. Much of the effort to fight malware is a simple game of ...
Everything you should know about API exposures by Byron Acohido

NEW TECH: Cequence Security’s new ‘API Sentinel’ helps identify, mitigate API exposures

Application Programming Interfaces – APIs. Without them digital transformation would never have gotten off the ground.Related: Defending botnet-driven business logic hacksAPIs made possible the astounding cloud, mobile and IoT services we have ...

DJ Sampath Chats about the COVID-19 Pandemic and Business Email Compromise

TechSpective Podcast Episode 048 Hello. It’s been a while. In my defense, time is just a construct and it seems to have mostly lost meaning–at least for me–during the COVID-19 pandemic quarantine ...
Why smarter authentication matters by Byron Acohido

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, ...
CISOs climb into the hot seat by Byron Acohido

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal ...
The case for 'shift left' deep testing in software development by Byron Acohido

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of ...
Addressing risks in a 'cloud-mobile' environment by Byron Acohido

NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks

It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
The case for tracking 'privileged activities' by Byron Acohido

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...