The case for decentralizing encryption key storage by Byron Acohido

RSAC Fireside Chat: A breakthrough in securing cloud collaboration — decentralized key storage

Back in 2002, when I was a reporter at USA Today, I had to reach for a keychain fob to retrieve a single-use passcode to connect remotely to the paper’s publishing system ...
Unifying 'CNAPP' and 'EDR' to fully protect modern networks by Byron Acohido

RSAC Fireside Chat: Dealing with the return of computing workloads to on-premises datacenters

A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms Many companies, indeed, are shifting to cloud-hosted IT infrastructure, and beyond that, to containerization and ...
Putting a stop to ungoverned, unauthorized shadow access. by Byron Acohido

RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’

The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...
Embedding mobile app security at the semiconductor layer by Byron Acohido

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. Related: Collateral damage ...
The case for shifting to containing, instead of blocking, ransomware by Byron Acohido

RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment

The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...
RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware

RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware

The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...
How Verimatrix is directing streamed content security at mobile apps by Byron Acohido

RSAC Fireside Chat: Deploying Hollywood-tested content protection to improve mobile app security

Your go-to mobile apps aren’t nearly has hackproof as you might like to believe. Related: Fallout of T-Mobile hack Hackers of modest skill routinely bypass legacy security measures, even two-factor authentication, with ...
The benefits of a collaborative, flexible MDR service by Byron Acohido

RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals

Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an onerous business expense? Related: Security sea-change wrought by ‘CMMC’ This would fit nicely with ...
The case for locating your NGWAF in your application delivery controller (ADC) by Byron Acohido

RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks

Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The role of legacy security tools Yet the heaviest volume of routine, daily cyber attacks continue ...

Secure Guardrails