Good intelligence in any theater of war is invaluable. Timely, accurate intel is the basis of a robust defense and can inform potent counterattacks. Related: Ukraine...
Author:
RSAC Fireside Chat: StackHawk helps move the application security needle to ‘shift everywhere’
By Byron V. Acohido Embedding security into the highly dynamic way new software gets created and put into service — on the fly, by leveraging ephemeral...
RSAC Fireside Chat: Demystifying cloud-stored data via ‘data security posture management’
By Byron V. Acohido In the age before the cloud, data security was straightforward. Related: Taming complexity as a business strategy Enterprises created or ingested data,...
RSAC Fireside Chat: ‘Protective DNS’ directs smart audits, automated remediation to IP addresses
By Byron V. Acohido Domain Name Service. DNS. It’s the phone directory of the Internet. Related: DNS — the good, bad and ugly Without DNS the...
RSAC Fireside Chat: Extending ‘shift left’ to achieve SSCS — ‘software supply chain security’
By Byron V. Acohido One of the nascent security disciplines already getting a lot of buzz as RSA Conference 2023 gets ready to open next week...
GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk
By Harman Singh No organization is immune to cybersecurity threats. Even the most well-protected companies can be susceptible to attacks if they are not careful about...
MY TAKE: Putin’s weaponizing of ransomware shows why network security needs an overhaul
At 10 am PDT, next Wednesday, April 19th, I’ll have the privilege of appearing as a special guest panelist and spotlight speaker on Virtual Guardian’s monthly...
GUEST ESSAY: Cyber hygiene need not be dreary — why engaging training is much more effective
By Lise Lapointe Instilling a culture of cyber security at your organization requires your people to maintain a high level of knowledge and awareness about cyber...
GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks
By Chandrashekhar Basavanna Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach...
GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors
By Adam Dennis Imagine being a young person who wants a career, of whatever type you can find, as a cybersecurity professional. Related: Up-skilling workers to...
GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there
By Matthew T. Carr Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the...
FIRESIDE CHAT: U.S. banking regulators call out APIs as embodying an attack surface full of risk
By Byron V. Acohido APIs have been a linchpin as far as accelerating digital transformation — but they’ve also exponentially expanded the attack surface of modern...
GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe
By Zac Amos The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity...
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation
By Collin McNulty One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping...
SHARED INTEL Q&A: Bi-partisan report calls for a self-sacrificing approach to cybersecurity
By Byron V. Acohido A new report from the Bipartisan Policy Center (BPC) lays out — in stark terms – the prominent cybersecurity risks of the...
GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?
By Jess Burn This year has kicked off with a string of high-profile layoffs — particularly in high tech — prompting organizations across all sectors to...
GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures
By Rakshith Rao APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. Related:...
GUEST ESSAY: Why CISOs absolutely must take authentication secrets much more seriously
The IT world relies on digital authentication credentials, such as API keys, certificates, and tokens, to securely connect applications, services, and infrastructures. Related: The coming of...
GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems
By Sashi Jeyaretnam A new generation of security frameworks are gaining traction that are much better aligned to today’s cloud-centric, work-from-anywhere world. Related: The importance of...