Security Boulevard at RSAC Singapore 2019

Security Boulevard is in attendance at RSA Conference Singapore 2019, covering sessions and hosting interviews through our sister site, Digital Anarchist. Keep watching for videos of conversations with the security industry’s finest, which will … Continue reading Security Boulevard at RSAC Singapore 2019

Experts weigh in on salient issues around emerging threats and security tech

RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners and customers across the region, experts share their thoughts on four hotly con… Continue reading Experts weigh in on salient issues around emerging threats and security tech

Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Businesses find identity and access management (IAM) and privileged access management (PAM) security disciplines difficult yet un-concerning. The results infer that IAM- and PAM-related security tasks may be deprioritized or neglected, potentially expo… Continue reading Businesses are struggling to implement adequate IAM and PAM processes, practices and technologies

Manufacturing sector most vulnerable to insider threats

Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious insiders (35%) ahead of account compromise (26%) as their leading concern. Small e… Continue reading Manufacturing sector most vulnerable to insider threats

Securing your app and driving down call center fraud

In this Help Net Security podcast, Angie White, Product Marketing Manager at iovation, talks about how optimizing the customer journey through your mobile app can help you optimize your call center. Here’s a transcript of the podcast for your convenien… Continue reading Securing your app and driving down call center fraud

Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

73 percent of IT security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state attacks. The Venafi survey on government-mandated encryption backdoors evaluated the opinions of 517 IT securit… Continue reading Backdoors inevitably create vulnerabilities that can be exploited by malicious actors

Anomali: Threat detection, investigation and response

In this Help Net Security podcast recorded at RSA Conference 2019, Nicholas Hayden, Senior Director of Threat Intelligence at Anomali, talks about how Anomali arms security teams with highly optimized threat intelligence, powered by machine learning. H… Continue reading Anomali: Threat detection, investigation and response

Serverless, shadow APIs and Denial of Wallet attacks

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise security leaders are having to tackle. Here’s a transcript of the podcast for yo… Continue reading Serverless, shadow APIs and Denial of Wallet attacks

Identify web application vulnerabilities and prioritize fixes with Netsparker

In this Help Net Security podcast, Ferruh Mavituna, CEO at Netsparker, talks about web application security and how Netsparker is helping businesses of any size keep their web applications secure. Here’s a transcript of the podcast for your convenience… Continue reading Identify web application vulnerabilities and prioritize fixes with Netsparker

Cybercriminals are increasingly using encryption to conceal and launch attacks

In this Help Net Security podcast, Deepen Desai, VP Security Research & Operations at Zscaler, talks about the latest Zscaler Cloud Security Insight Report, which focuses on SSL/TLS based threats. Here’s a transcript of the podcast for your conven… Continue reading Cybercriminals are increasingly using encryption to conceal and launch attacks