Steps forward
STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?
Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and ...
Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount
APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...
GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity
If you’re a small business looking for the secret sauce to cybersecurity, the secret is out: start with a cybersecurity policy and make the commitment to security a business-wide priority. Related: SMBs ...
STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road
New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. Related: The need for supply chain security This ...
GUEST ESSAY: Lessons to be learned from the waves of BofA phone number spoofing scams
Phone number spoofing involves manipulating caller ID displays to mimic legitimate phone numbers, giving scammers a deceptive veil of authenticity. Related: The rise of ‘SMS toll fraud’ The Bank of America scam ...
Black Hat insights: Generative AI begins seeping into the security platforms that will carry us forward
LAS VEGAS – Just when we appeared to be on the verge of materially shrinking the attack surface, along comes an unpredictable, potentially explosive wild card: generative AI. Related: Can ‘CNAPP’ do ...
GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication
Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been ...
Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?
A fledgling security category referred to as Cloud-Native Application Protection Platforms (CNAPP) is starting to reshape the cybersecurity landscape. Related: Computing workloads return on-prem CNAPP solutions assemble a varied mix of security ...
MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy
To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. Related: Using ‘Big Data’ to improve health and well-being But there’s ...
FIRESIDE CHAT: Outrageous phone bills stun businesses targeted for ‘SMS toll fraud’
SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk, who explained ...