Three firmware blind spots impacting security

Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly. As software security has been significantly hardened over the past two decades, hackers have responded by moving… Continue reading Three firmware blind spots impacting security

Understanding the basics of API security

This is the first of a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in software development, operations, and protection. Purpose of article series … Continue reading Understanding the basics of API security

Five best practices for achieving and maintaining SOC 2 compliance

A crucial framework for technology companies and cloud-based organizations, SOC 2 is both a technical audit and a requirement that comprehensive information security policies and procedures be written and followed. Overall, the goal of SOC 2 is to ensu… Continue reading Five best practices for achieving and maintaining SOC 2 compliance

Client-side web security

To address attacks such as XSS, Magecart and other card skimming exploits found in modern eCommerce environments, the use of client-side web security methods is beginning to emerge as a particularly useful practice. Obviously, enterprise teams should i… Continue reading Client-side web security

Let’s be realistic about our expectations of AI

Pop culture contains no shortage of intelligent robots. When the tool became viable and widely available in real life, people brought a number of enthusiastic but unrealistic expectations to the table. Unfortunately, Amazon’s Alexa isn’t as smart as HA… Continue reading Let’s be realistic about our expectations of AI

Five contingency best practices for SOCs to handle uncertainty

With a crush of new teleworkers and a significant increase in endpoints coming online, we’ve entered into a new reality. COVID-19 has disrupted our lives and the business world – possibly for longer than we’d planned. Once the pandemic ends, comp… Continue reading Five contingency best practices for SOCs to handle uncertainty

Foiling content-borne attacks against a remote workforce

Opening a single email with a malicious URL or attachment can threaten your organization. In this interview, Liron Barak, CEO at BitDam, discusses the cybersecurity issue related to remote work, the inadequate security of collaboration tools, and more…. Continue reading Foiling content-borne attacks against a remote workforce

CISOs: Quantifying cybersecurity for the board of directors

Only 9% of security teams feel as if they are highly effective in communicating security risks to the board and to other C-suite executives, according to a recent survey conducted by the Ponemon Institute. As a CISO, it can seem as though it is impossi… Continue reading CISOs: Quantifying cybersecurity for the board of directors

Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope with specialized features and capabilities unique to each platform. These feat… Continue reading Multi-cloud key management and BYOK

Understanding web security solutions

As should be evident to anyone in the cyber security industry, the wide range of available web security solutions from commercial vendors will necessarily have varying degrees of effectiveness against different threats. A premise of this article is tha… Continue reading Understanding web security solutions