Mike Fey, Co-Founder & CEO of Island, highlights how the enterprise browser's adoption has surged across sectors. He delves into new use cases, including resilience, healthcare and inter-company collaboration, emphasizing the importance of security and productivity in dynamic environments.
As cloud adoption accelerates, the unchecked growth of nonhuman identities is exposing companies to increased risks. Adam Cheriki, CTO and co-founder of Entro Security, explains why securing these identities is crucial and how the company's platform delivers a comprehensive solution.
Jeff Williams, founder and CTO of Contrast Security, introduces ADR, a solution designed to address the visibility gap in security operations by monitoring applications and APIs. He explains how ADR blocks and detects attacks, preventing the exploitation of vulnerabilities.
Microsoft's Sherrod DeGrippo delves into the rise of SIM swapping, the role of social engineering in cyberattacks, and the emerging use of AI by threat actors. She emphasizes the need for real multifactor authentication and advanced strategies to counter these evolving threats.
When the war in Ukraine disrupted its GPS capabilities - crucial for power grid synchronization - Cisco Talos assembled a team of experts to address the issue. Joe Marshall, senior security strategist at Cisco Talos, led the collaborative response, known as Project PowerUp.
Huntress CTO Chris Bisnett outlines the firm's innovative approach to simplifying SIEM by reducing data storage costs and focusing on relevant logs. These services support small and midsized businesses looking to enhance their security posture without the high expenses of a traditional SIEM.
Previous studies on IoT and OT devices have primarily focused on internal components, neglecting open-source components that are crucial for internet and network connectivity, according to Stanislav Dashevskyi and Francesco La Spina, security researchers at Forescout Technologies.
Small and midsized firms have to strategically determine how to allocate their limited resources to secure their operations, as threats - along with the cybersecurity tools to defend against them - increase in sophistication. These companies often end up as vulnerable targets for adversaries.
Mobile password managers are different from computer-based password managers due to different constraints found in the mobile operating system, said Ankit Gangwal, assistant professor at the International Institute of Information Technology. He shed light on the risks introduced by AutoSpill.
Sharan Hiremath, senior product manager at JFrog, delved into the escalating challenge of supply chain attacks. With a focus on the surge in open-source vulnerabilities, he outlined key factors contributing to the rise of attacks and offered insights into threat mitigation strategies.
Domain name system or DNS attacks have persisted as a popular method for carrying out DDoS attacks. Haixin Duan, professor at Tsinghua University's Institute for Network Sciences and Cyberspace, describes TsuKing as a new form of DNS attack that does not require IP address spoofing.
Javvad Malik, lead security awareness advocate at KnowBe4, delves into the transition from cybersecurity awareness to a robust security culture. He underscored the importance of user-centric security, engaging security training and flexible security measures - in addition to MFA.
Marc Lueck, EMEA CISO at Zscaler, describes generative AI as the bridge between traditional AI and machine learning. He said it offers the ability to engage in humanlike conversations while tapping into vast data repositories and is both a powerful defense mechanism and a potential vulnerability.
Automating decision-making in the security operations center strengthens an organization's ability to detect, respond to and mitigate security threats effectively. But the focus has shifted from micro-automation to a unified platform, according to Michael Lyborg, CISO of Swimlane.
Marta Rybczyńska, technical program manager at Eclipse Foundation, discussed best practices for reporting vulnerabilities, adopting AI and bridging the gap between developers and security researchers to adhere to cybersecurity best practices for open-source software.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.