Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent

Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program ...

Unlocking the Secrets of Non-Human Identities

TechSpective Podcast Episode 136   There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...

Deepfakes Are Having a Deeper Impact on These Three Industries

Artificial intelligence (AI) is having a profound impact on business, and it hasn’t all been positive. Aside from automating business processes and providing better business intelligence, AI has also given criminals a ...

Exploring the Future of Cybersecurity in a SaaS-Driven World

TechSpective Podcast Episode 135   In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three ...
situational, awareness, Wyze connected camera

 How Situational Awareness Enhances the Security of Your Facility

Situational awareness means what is happening around you, making educated judgments, and responding appropriately to any given scenario. It can be helpful on an individual level and also to organizations for making ...
Security Boulevard

Revolutionizing Cloud Security with Sweet Security

Cloud computing has transformed the way businesses operate by offering scalability, flexibility, and cost savings. However, with these advantages come significant security challenges. Protecting sensitive data in the cloud is not just ...
Fortinet, SASE, Opal, access privileges, cloud security, GenAI, generative AI cloud compromise LLM

Opal Security Extends Scope and Reach of Platform for Managing Privileges

Opal Security this week updated its privilege posture management platform to provide the ability to detect irregular access to an IT environment and manage privileges by groups ...
Security Boulevard

Democratizing Cybersecurity: The Strength of Community Collaboration

Cybersecurity continues to transcend the realm of specialists, becoming a paramount concern for individuals and organizations. As cyber threats escalate, the need to safeguard our digital existence has birthed the concept of ...
Meta TikTok disinformation EU

How Bots and AI are Fueling Disinformation

The rise of advanced AI and large language models has fundamentally altered the landscape of disinformation ...
Security Boulevard
VPNs, firewalls, zero-trust, Implementing Zero-Trust Model

If You are Reachable, You Are Breachable, and Firewalls & VPNs are the Front Door 

Firewalls and VPN appliances are critical gateways. Like all on-prem systems, a vulnerability can lead to a compromise that is used to open the door for attackers.    ...
Security Boulevard

Application Security Check Up