RSA Podcasts
RSAC Fireside Chat: A breakthrough in securing cloud collaboration — decentralized key storage
Back in 2002, when I was a reporter at USA Today, I had to reach for a keychain fob to retrieve a single-use passcode to connect remotely to the paper’s publishing system ...
RSAC Fireside Chat: Dealing with the return of computing workloads to on-premises datacenters
A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms Many companies, indeed, are shifting to cloud-hosted IT infrastructure, and beyond that, to containerization and ...
RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’
The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints
bacohido | | Best Practices, For Consumers, For Technologists, Podcasts, RSA Podcasts, Steps forward, Top Stories
The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...
RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime
As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding cool new functionalities to our go-to mobile apps. Related: Collateral damage ...
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment
The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...
RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware
The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all ...
RSAC Fireside Chat: Deploying Hollywood-tested content protection to improve mobile app security
Your go-to mobile apps aren’t nearly has hackproof as you might like to believe. Related: Fallout of T-Mobile hack Hackers of modest skill routinely bypass legacy security measures, even two-factor authentication, with ...
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals
Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an onerous business expense? Related: Security sea-change wrought by ‘CMMC’ This would fit nicely with ...
RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks
Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The role of legacy security tools Yet the heaviest volume of routine, daily cyber attacks continue ...