Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido A cloud migration backlash, of sorts, is playing out. Related: Guidance for adding ZTNA to cloud platforms...
Author:
GUEST ESSAY: Using generative AI to support — not replace — overworked cybersecurity pros – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zac Amos As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to...
RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’ – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began...
RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Byron V. Acohido The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zack Butcher Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The...
GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Eric Sugar Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change...
RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido As digital transformation accelerates, Application Programming Interfaces (APIs) have become integral to software development – especially when it comes to adding...
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Cyber extortion...
RSAC Fireside Chat: Counteracting Putin’s weaponizing of ransomware — with containment – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The...
RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The...
RSAC Fireside Chat: Deploying Hollywood-tested content protection to improve mobile app security – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Your go-to mobile apps aren’t nearly has hackproof as you might like to believe. Related: Fallout of...
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Byron Acohido Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an...
RSAC Fireside Chat: Achieving ‘outcome-based security’ by blending cybersecurity, business goals – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron Acohido Could cybersecurity someday soon be implemented as a business enabler, instead of continuing to be viewed as an...
RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The...
SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Kolawole Samuel Adebayo In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect....
SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Kolawole Samuel Adebayo In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect....
RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Email remains by far the no.1 business communications tool. Meanwhile, weaponized email continues to pose a clear...
MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido One meeting I had at RSA Conference 2023, was a briefing about a new partnership, announced this...
GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Sara Velasquez Posada There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning...
GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zac Amos The rising complexity and prevalence of cybersecurity threats are making experts anxious. Related: Training employees to mitigate phishing...
GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido By Zac Amos The rising complexity and prevalence of cybersecurity threats are making experts anxious. It pressures working analysts to perform...
MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The theme of RSA Conference 2023 — ‘stronger together’ — was certainly well chosen. Related: Demystifying ‘DSPM’...
MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido “Stronger together” was the theme of RSA Conference 2023, which returned to its pre-Covid grandeur under the...
RSAC Fireside Chat: Turning full attention to locking down the security of ‘open source’
By Byron V. Acohido Software composition analysis — SCA – is a layer of the security stack that, more so than ever, plays a prominent role...
Guest essay: A roadmap for how — and why — all MSSPs should embrace live patching
By Jim Jackson Patch management has always been time-consuming and arduous. But it gets done, at least to some degree, simply because patching is so crucial...
RSAC Fireside Chat: Here’s why companies are increasingly turning to MSSPs for deeper help
By Byron V. Acohido Managed Security Service Providers, MSSPs, have been around for some time now as a resource to help companies operate more securely. Related:...
RSAC Fireside Chat: Cybersixgill crawls the Dark Web to uncover earliest signs of companies at risk
By Byron V. Acohido Adopting personas and rubbing elbows with criminal hackers and fraudsters is a tried-and-true way to glean intel in the Dark Web. Related:...