NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security.
We began the new millennium with on-premises data centers supporting servers and desktops that a technician in sneakers co… Continue reading NEW TECH: Will ‘Secure Access Service Edge’ — SASE — be the answer to secure connectivity?

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to the metal on projects to switch over to … (more…)
Continue reading NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

The amazing array of digital services we so blithely access on our smartphones wouldn’t exist without agile software development.
Related: ‘Business logic’ hacks on the rise
Consider that we began this century relying on the legacy “waterfall” software… Continue reading NEW TECH: A better way to secure agile software — integrate app scanning, pen testing into WAF

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.
Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are c… Continue reading NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting  access to sensitive systems inside of a corporate network.
Related: Active Directory holds ‘keys to the kingdom’
The basic idea was to make sure … Continue reading NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.
Related: A firewall for microservices
DevSecOps arose to insert security checks and balances into DevOps, aim… Continue reading NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

Defending business networks isn’t getting any easier. Companies can have the latest, greatest perimeter defenses, intrusion detection systems and endpoint protections – and attackers will still get through. Just ask Equifax or Capital One.
Continue reading Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.
I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR… (m… Continue reading NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day.
I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR… (m… Continue reading NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space

NEW TECH: WhiteHat Security tackles ‘dangling buckets,’ other new web app exposures

WhiteHat Security got its start some 17 years ago in Silicon Valley to help companies defend their public-facing websites from SQL injection and cross-site scripting hacks.
Related: Mobile apps are full of vulnerabilites
Both hacking methods remain a p… Continue reading NEW TECH: WhiteHat Security tackles ‘dangling buckets,’ other new web app exposures