Podcasts
MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks
Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today.Related: Why U.S. cybersecurity policy needs to match societal ...
BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps
DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.Related: What’s driving ‘memory attacks’Yet a funny thing has happened as DevOps – the philosophy of ...
NEW TECH: CASBs continue evolving to help CISOs address multiplying ‘cloud-mobile’ risks
It can be argued that we live in a cloud-mobile business environment.Related: The ‘shared responsibility’ burdenMost organizations are all caught up, to one degree or another, in migrating to hybrid cloud networks ...
NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’
Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network.Related: Active Directory holds ‘keys to the kingdom’The basic idea ...
NEW TECH: Semperis introduces tools to improve security resiliency of Windows Active Directory
Ransomware continues to endure as a highly lucrative criminal enterprise.Ransomware hacking groups extorted at least $144.35 million from U.S. organizations between January 2013 and July 2019. That’s the precise figure recently disclosed ...
SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses
In one sense, digital transformation is all about machines.Related: Authenticating IoT devicesPhysical machines, like driverless vehicles and smart buildings; but, even more so, virtual machines. I’m referring to the snippets of “microservice” ...
STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules
We’ve come to rely on our smartphones to live out our digital lives, both professionally and personally.When it comes to securing mobile computing devices, the big challenge businesses have long grappled with ...
MY TAKE: ‘Network Detection and Response’ emerges as an Internet of Things security stopgap
There’s no stopping the Internet of Things now.Related: The promise, pitfalls of IoTCompanies have commenced the dispersal of IoT systems far and wide. Data collected by IoT devices will increasingly get ingested ...
SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities
bacohido | | For Consumers, For Technologists, Imminent threats, Podcasts, RSA Podcasts, Top Stories
Application programming interface. API. It’s the glue holding digital transformation together.Related: A primer on ‘credential stuffing’APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are literally everywhere ...
BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams
bacohido | | Best Practices, For Consumers, For Technologists, Podcasts, RSA Podcasts, Steps forward
Cyber criminals who specialize in plundering local governments and school districts are in their heyday.Related: How ransomware became a scourgeRansomware attacks and email fraud have spiked to record levels across the U.S ...
