RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

Much attention has been paid to the widespread failure to detect the insidious Sunburst malware that the SolarWinds hackers managed to slip deep inside the best-defended networks on the planet.
Related: The undermining of the global supply chain
But th… Continue reading RSAC insights: Deploying SOAR, XDR along with better threat intel stiffens network defense

RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

It’s accurate to say that security has been bolted onto modern business networks.
It also has become very clear that we won’t achieve the full potential of digital transformation without security somehow getting intricately woven into every layer of co… Continue reading RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

Doing authentication well is vital for any company in the throes of digital transformation.
Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are c… Continue reading NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

DevOps wrought Uber and Netflix. In the very near future DevOps will help make driverless vehicles commonplace.
Related: What’s driving  ‘memory attacks’
Yet a funny thing has happened as DevOps – the philosophy of designin… Continue reading BEST PRACTICES: How testing for known memory vulnerabilities can strengthen DevSecOps

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

Privileged Access Management (PAM) arose some 15 years ago as an approach to restricting  access to sensitive systems inside of a corporate network.
Related: Active Directory holds ‘keys to the kingdom’
The basic idea was to make sure … Continue reading NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

In one sense, digital transformation is all about machines.
Related: Authenticating IoT devices
Physical machines, like driverless vehicles and smart buildings; but, even more so, virtual machines. I’m referring to the snippets of “microser… Continue reading SHARED INTEL: Study shows mismanagement of ‘machine identities’ triggers $52 billion in losses

STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

We’ve come to rely on our smartphones to live out our digital lives, both professionally and personally.
When it comes to securing mobile computing devices, the big challenge businesses have long grappled with is how to protect company assets whi… Continue reading STEPS FORWARD: How the Middle East led the U.S. to adopt smarter mobile security rules

SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

Application programming interface. API. It’s the glue holding digital transformation together.
Related: A primer on ‘credential stuffing’
APIs are the conduits for moving data to-and-fro in our digitally transformed world. APIs are li… Continue reading SHARED INTEL: How attacks on web, mobile apps are being fueled by rising API vulnerabilities

BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

Cyber criminals who specialize in plundering local governments and school districts are in their heyday.
Related: How ransomware became a scourge
Ransomware attacks and email fraud have spiked to record levels across the U.S. in each of the past &#8230… Continue reading BEST PRACTICES: Mock attacks help local agencies, schools prepare for targeted cyber scams

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far.
Related: What we’ve learned from the massive breach of Capitol One
At RSA 2020, I learned about how one of the routine &#8230… Continue reading BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier