Is Google a Monopoly? Breaking Down the Latest Accusations

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
What it takes to mitigate advanced phishing attacks by Byron Acohido

Black Hat Fireside Chat: User feedback, AI-infused email security are both required to deter phishing

I recently learned all about the state-of-the art of phishing attacks – the hard way. Related: GenAI-powered attacks change the game An email arrived from the head of a PR firm whom ...
Black Hat 2024 and the Rise of AI-Driven Cyber Defense

Black Hat 2024 and the Rise of AI-Driven Cyber Defense

Over six days, cybersecurity professionals immersed themselves in cutting-edge training, insightful briefings, and a bustling business hall featuring over 400 booths. This year’s conference proved once again why Black Hat remains the ...
Going beyond 'SBOM' to secure software supply chains by Byron Acohido

Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure

President Biden’s call for the mainstreaming of Software Bill of Materials (SBOMs) is a major step forward. Related: Europe mandates resiliency Requiring a formal inventory of all components, libraries and modules in ...

Black Hat 2024: Why Knowing Your Users is the Ultimate Defense

Proactive insider risk management is the name of the game, and DTEX Systems’ Blurred Lines event at Black Hat made such clear. Those in attendance no doubt have Black Hat 2024 in ...
How Active ASPM augments application security by Byron Acohido

Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws

Application Security Posture Management (ASPM) arose a few years ago as a strategy to help software developers and security teams continually improve the security of business applications. Related: Addressing rising cyber compliance ...
MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024: GenAI is  very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency ...
Meeting the challenge of securing APIs by Byron Acohido

Black Hat Fireside Chat: The role of API Security in mitigating online fraud, emerging GenAI risks

LAS VEGAS — As Black Hat USA 2024 plays out here this week, the disruptive impact of GenAI/LLM at many different levels will be in the spotlight. Related: GenAI introduces fresh risks ...
Locking down user identity with a smart piece of jewelry by Byron Acohido

Black Hat Fireside Chat: Token’s wearable MFA solution combines PKI, biometrics — in a ring

LAS VEGAS — Humans, unsurprisingly, remain the weak link in cybersecurity. Related: Digital identity best practices We’re gullible – and we can’t get away from relying on usernames and passwords. Steady advances ...
Black Hat Fireside Chat: ‘Black Girls Hack’ emphasizes diversity as effective force multiplier

Black Hat Fireside Chat: ‘Black Girls Hack’ emphasizes diversity as effective force multiplier

When Tennisha Martin, a veteran software quality assurance analyst, sought to move over to a security team a few years ago, the doors should have been wide open, given the much-ballyhooed cybersecurity ...

Application Security Check Up