A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal…
The Growing Importance of API Security
APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and CPO, Cequence Security Earlier this year I wrote a blog about key trends in…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
Secure Passwords are not Always Secure
Just because it meets the complexity test does not mean it is secure. By James Gorman, Lead Writer and Staff Reporter Cyber Defence Media Group Most of the insider threats and…
How to Address Multi-Cloud Security
By William Klusovsky, CISSP, CISM,NTT Ltd. Networks for our businesses are not as simple as they used to be. With the evolution of cloud environments and the multitude of “everything…
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email,…
DivvyCloud 2020 Predictions
By Chris DeRamus, CTO and co-founder, DivvyCloud Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020,…
Seven Security Predictions for 2020
By Corey Nachreiner Each year, the WatchGuard Threat Lab research team examines the top emerging threats and trends across the information security landscape to develop predictions for the coming year….
Moving Network Security to The Cloud
What Is Secure Access Service Edge (Sase) And Why It Matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only…
More Spending Won’t Solve Your Hardest IT Challenges In 2020 And Beyond. Here’s What Will.
By Chris Hallenbeck, CISO of the Americas at Tanium U.S. state and local governments have been observing the proposed State and Local Cybersecurity Government Act of 2019, especially since it…
Anomaly Detection Is the Next Cybersecurity Paradigm
It’s time to move beyond static lists of things forbidden and things allowed. By Aron Hsiao, Director of Marketing and Insights, Plurilock Static lists have long been at the heart…
Getting PKI Right
Program Failures and How to Avoid Them By Chris Hickman, chief security officer, Keyfactor Public Key Infrastructure (PKI) has survived the test of time. Today, IT leaders and managers view…