Today marks the beginning of the Identiverse conference in Las Vegas, where leaders in security gather to discuss advancements in the world of identity and access management. For MSSPs that specialize in managed IAM services, it's important to stay on top of the latest trends, including those revealed in a series of reports and articles that CyberR...
Creating a zero-trust architecture is a gradual process that starts with understanding precisely what you need to implement a “never trust, always verify” approach within your extended organization. Rather than materializing all at once, organizations often develop a ZTA in phases over time. However, during this maturation process, gaps in zero-tru...
This session will provide an overview of the history of host firmware, or BIOS, focusing on the arc of the Unified Extensible Firmware Interface. It will include the development of defenses like UEFI Secure Boot and the challenges in scaling assurance across a broad ecosystem. It will close on works-in-progress and opportunities to build upon the s...
In the enterprise security news,
A light week in funding, after last week’s mega raises from Wiz and Sandbox AQ
HP acquires some Zero Trust and CASB with Axis Security
InfoSec-themed Table Top gaming is really catching on
The White House’s updated cybersecurity strategy is more of an update than a game changer
I go a bit nuts with AI news and essay...
The CISA director called for a shift away from a business model that treats cybersecurity as an afterthought to one where large manufacturers are responsible for tech security.