STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

STEPS FORWARD Q&A: Will ‘proactive security’ engender a shift to risk-based network protection?

Something simply must be done to slow, and ultimately reverse, attack surface expansion. Related: What Cisco’s buyout of Splunk really signals We’re in the midst of driving towards a dramatically scaled-up and ...
The inevitable rise of robust API security by Byron Acohido

Black Hat Fireside Chat: In a hyper-connected world, effectively securing APIs is paramount

APIs. The glue of hyper connectivity; yet also the wellspring of risk. Related: The true scale of API breaches I had an enlightening discussion at Black Hat USA 2023 with Traceable.ai Chief ...
GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

If you’re a small business looking for the secret sauce to cybersecurity, the secret is out: start with a cybersecurity policy and make the commitment to security a business-wide priority. Related: SMBs ...
Why governments globally are prioritizing IoT security

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. Related: The need for supply chain security This ...
GUEST ESSAY:  Lessons to be learned from the waves of BofA phone number spoofing scams

GUEST ESSAY: Lessons to be learned from the waves of BofA phone number spoofing scams

Phone number spoofing involves manipulating caller ID displays to mimic legitimate phone numbers, giving scammers a deceptive veil of authenticity. Related: The rise of ‘SMS toll fraud’ The Bank of America scam ...
Black Hat insights: Generative AI  begins seeping into the security platforms that will carry us forward

Black Hat insights: Generative AI begins seeping into the security platforms that will carry us forward

LAS VEGAS – Just when we appeared to be on the verge of materially shrinking the attack surface, along comes an unpredictable, potentially explosive wild card: generative AI. Related: Can ‘CNAPP’ do ...
GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been ...
Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?

Steps Forward: Can ‘CNAPP’ solutions truly unify cloud, on-premises best cybersecurity practices?

A fledgling security category referred to as Cloud-Native Application Protection Platforms (CNAPP) is starting to reshape the cybersecurity landscape. Related: Computing workloads return on-prem CNAPP solutions assemble a varied mix of security ...
MY TAKE:  ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

To tap the full potential of massively interconnected, fully interoperable digital systems we must solve privacy and cybersecurity, to be sure. Related: Using ‘Big Data’ to improve health and well-being But there’s ...
How SMS toll fraudsters plunder businesses by Byron Acohido

FIRESIDE CHAT: Outrageous phone bills stun businesses targeted for ‘SMS toll fraud’

SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk, who explained ...

Secure Guardrails