SAP systems: The threat of insecure configurations

Onapsis researchers revealed a critical security configuration vulnerability that results from default installations in SAP systems which if left insecure, could lead to a full system compromise in unprotected environments. In this podcast recorded at … Continue reading SAP systems: The threat of insecure configurations

The importance of threat intelligence and vulnerability remediation prioritization

In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat intelligence and vulnerability remediation prioritization. Here’s a transcript of th… Continue reading The importance of threat intelligence and vulnerability remediation prioritization

Securing the digital future with Vera and Canon Solutions America

In this podcast recorded at RSA Conference 2018, Ajay Arora, founder of Vera Security, and Peter Kowalczuk, President at Canon Solutions America, talk about their recent partnership, challenges related to data security, and the conference. Here’s a tra… Continue reading Securing the digital future with Vera and Canon Solutions America

Bring order to the chaos of incident response and threat investigations

In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well as the ideas behind a new product called ThreatQ Investigations. Here’s a tr… Continue reading Bring order to the chaos of incident response and threat investigations

Wi-Fi honeypots: Alive and well at RSAC 2018

It was a gorgeous, sunny week in San Francisco as the best and brightest security experts around the globe gathered to attend one of the leading cybersecurity tradeshows in the industry – RSA Conference 2018. From hacking iOS to why security matt… Continue reading Wi-Fi honeypots: Alive and well at RSAC 2018

Should governments regulate social media data collection?

Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber security, privacy threats and government regulation. According to the survey, 70 perc… Continue reading Should governments regulate social media data collection?

Fortanix Runtime Encryption: Protect sensitive applications and data in use

Encryption is an effective data protection control, however it’s use is currently limited to data at rest and data in motion. When, an application starts to run, it’s data in use is vulnerable to a variety of attacks including malicious insiders, root … Continue reading Fortanix Runtime Encryption: Protect sensitive applications and data in use

RSA App Exposes User Data Due to Common Developer Mistake

Late last week security researchers found the RSA security conference exposing conference attendee data via vulnerabilities in its mobile app. Because a 3rd party developer had hard coded data – including security keys and passwords – in th… Continue reading RSA App Exposes User Data Due to Common Developer Mistake

Tackle cyber threats in real time with the Micro Focus enterprise security platform

In this podcast recorded at RSA Conference 2018, John Delk, Chief Product Officer and the General Manager of the security product group at Micro Focus, talks about how Micro Focus’ solutions comprise an enterprise-grade security platform with built-in … Continue reading Tackle cyber threats in real time with the Micro Focus enterprise security platform