Source: www.lastwatchdog.com – Author: bacohido The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms...
Author:
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zack Butcher Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change...
RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding...
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Cyber extortion...
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The...
RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The...
RSAC Fireside Chat: Deploying Hollywood-tested content protection to improve mobile app security – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Your go-to mobile apps aren’t nearly has hackproof as you might like to believe. Related: Fallout of...
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Byron Acohido Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an...
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron Acohido Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an...
RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The...
SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Kolawole Samuel Adebayo In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect....
SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Kolawole Samuel Adebayo In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect....
RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Email remains by far the no.1 business communications tool. Meanwhile, weaponized email continues to pose a clear...
MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido One meeting I had at RSA Conference 2023, was a briefing about a new partnership, announced this...
GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Sara Velasquez Posada There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning...
GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zac Amos The rising complexity and prevalence of cybersecurity threats are making experts anxious. Related: Training employees to mitigate phishing...
GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Zac Amos The rising complexity and prevalence of cybersecurity threats are making experts anxious. It pressures working analysts to perform...
MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The theme of RSA Conference 2023 — ‘stronger together’ — was certainly well chosen. Related: Demystifying ‘DSPM’...
MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido “Stronger together” was the theme of RSA Conference 2023, which returned to its pre-Covid grandeur under the...
RSAC Fireside Chat: Turning full attention to locking down the security of ‘open source’
By Byron V. Acohido Software composition analysis — SCA – is a layer of the security stack that, more so than ever, plays a prominent role...
Guest essay: A roadmap for how — and why — all MSSPs should embrace live patching
By Jim Jackson Patch management has always been time-consuming and arduous. But it gets done, at least to some degree, simply because patching is so crucial...
RSAC Fireside Chat: Here’s why companies are increasingly turning to MSSPs for deeper help
By Byron V. Acohido Managed Security Service Providers, MSSPs, have been around for some time now as a resource to help companies operate more securely. Related:...
RSAC Fireside Chat: Cybersixgill crawls the Dark Web to uncover earliest signs of companies at risk
By Byron V. Acohido Adopting personas and rubbing elbows with criminal hackers and fraudsters is a tried-and-true way to glean intel in the Dark Web. Related:...
RSAC Fireside Chat: How timely intel from the cyber underground improves counter measures
Good intelligence in any theater of war is invaluable. Timely, accurate intel is the basis of a robust defense and can inform potent counterattacks. Related: Ukraine...
RSAC Fireside Chat: StackHawk helps move the application security needle to ‘shift everywhere’
By Byron V. Acohido Embedding security into the highly dynamic way new software gets created and put into service — on the fly, by leveraging ephemeral...
RSAC Fireside Chat: ‘Protective DNS’ directs smart audits, automated remediation to IP addresses
By Byron V. Acohido Domain Name Service. DNS. It’s the phone directory of the Internet. Related: DNS — the good, bad and ugly Without DNS the...
RSAC Fireside Chat: Extending ‘shift left’ to achieve SSCS — ‘software supply chain security’
By Byron V. Acohido One of the nascent security disciplines already getting a lot of buzz as RSA Conference 2023 gets ready to open next week...
GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk
By Harman Singh No organization is immune to cybersecurity threats. Even the most well-protected companies can be susceptible to attacks if they are not careful about...
MY TAKE: Putin’s weaponizing of ransomware shows why network security needs an overhaul
At 10 am PDT, next Wednesday, April 19th, I’ll have the privilege of appearing as a special guest panelist and spotlight speaker on Virtual Guardian’s monthly...




























