HEAT and EASM: What to Know About the Top Acronyms at RSA

The cybersecurity industry is littered with acronyms. SIEM. EDR. APT. CISO. CISA. The list goes on and on. So it wasn’t surprising that there were a lot of acronyms in RSAC 2023’s sessions and keynotes, as well as in the dozens of news items and studies released during the conference. The hottest acronym, by far, […]

The post HEAT and EASM: What to Know About the Top Acronyms at RSA appeared first on Security Intelligence.

Continue reading HEAT and EASM: What to Know About the Top Acronyms at RSA

5 Devastating Endpoint Attacks: Lessons Learned

Many cybersecurity attacks, including some of the biggest and most recent attacks, target corporate endpoints. Reviewing these five large attacks that leveraged weaknesses in endpoints can teach organizations important lessons and identify a few best … Continue reading 5 Devastating Endpoint Attacks: Lessons Learned

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists. Continue reading How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

I don’t like dogs; I need a dog.

This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs in Heaven, then when I die, I want to go where they went.”…
The post I don&#821… Continue reading I don’t like dogs; I need a dog.

Tips and Best Practices for Network Security in the Connected Enterprise

Despite the best collective efforts of the global IT community, cybercriminals are still making their way into what many believe are secure networks. Experts now predict cybercrime damages will reach $6 trillion by 2021. And a single breach these days… Continue reading Tips and Best Practices for Network Security in the Connected Enterprise

Jon Oberheide on Perimeter Security

Mike Mimoso talks to Duo Security co-founder and CTO Jon Oberheide at RSA Conference about Google’s BeyondCorp security model, enforcing perimeter security, how endpoint security has evolved through the years, and the future of passwords. Continue reading Jon Oberheide on Perimeter Security