The importance of securing machine-to-machine and human-to-machine interaction

In this interview with Help Net Security, Oded Hareven, CEO at Akeyless, explains how organizations manage secrets, particularly how this practice has changed and evolved amid the rapid shift to hybrid/remote work and how it benefits organizations secu… Continue reading The importance of securing machine-to-machine and human-to-machine interaction

Multicloud environment complexities putting digital transformation at risk

Dynatrace announced the findings of an independent global survey of 1,300 CIOs and senior IT practitioners involved in infrastructure management. The research reveals the challenges organizations face as they overwhelmingly turn to multicloud architect… Continue reading Multicloud environment complexities putting digital transformation at risk

AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset

In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a good practice and how it can advance cybersecurity overall. AI and ML have b… Continue reading AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset

How the pandemic fueled enterprise digital transformation

The COVID-19 pandemic has accelerated enterprise digital transformation by three to five years as companies build IT ecosystems to enable growth, innovation and improved customer experiences under new conditions, according to a research report publishe… Continue reading How the pandemic fueled enterprise digital transformation

Magnet Forensics’ Stephen Boyce on Collaboration, Automation, and Developing DFIR Skills

Christa Miller: As digital technology becomes more embedded into humans’ everyday lives, enhancing our efficiency at work, our social lives, even our health and movements, it likewise facilitates criminal activity. Growing in volume and complex… Continue reading Magnet Forensics’ Stephen Boyce on Collaboration, Automation, and Developing DFIR Skills

Automated Mushroom Cultivation Yields Delicious Fried Goodies

[Kyle Gabriel] knows mushrooms, and his years of experience really shine through in his thorough documentation of an automated mushroom cultivation environment, created with off-the-shelf sensors and hardware as much …read more Continue reading Automated Mushroom Cultivation Yields Delicious Fried Goodies

Enterprise PKI automation: The modern approach to certificate lifecycle management

Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In the wake of this identity explosion, it has never been more important for IT … Continue reading Enterprise PKI automation: The modern approach to certificate lifecycle management

Bridging the “front and back of the house”: A lesson in risk management

Between cloud proliferation, new tech infrastructure and tools and an increasingly distributed workforce, organizations are struggling to implement proper risk management practices. They often ignore one of the most important components of a solid risk… Continue reading Bridging the “front and back of the house”: A lesson in risk management

Short Bitcoin Heist: Topological Data Analysis For Ransomware Investigations

Hi, I’m Cuneyt Gurcan Akcora, and I’ll be presenting our ransomware detection work on the Bitcoin blockchain by using topological data analysis. This is joint work with professors Gel and Kantarcioglu from the University of Texas at D… Continue reading Short Bitcoin Heist: Topological Data Analysis For Ransomware Investigations

Preventing document fraud in a world built on digital trust

All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents such as a passport or driving license. Anyone looking to misrepresent who th… Continue reading Preventing document fraud in a world built on digital trust