Unlocking the Secrets of Non-Human Identities
TechSpective Podcast Episode 136 There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service accounts—are the invisible lifeblood of today’s automated systems, […] The post Unlocking the Secrets of Non-Human Identities appeared ... Read More
Exploring the Future of Cybersecurity in a SaaS-Driven World
TechSpective Podcast Episode 135 In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three decades of experience in cybersecurity, Guy shares his […] The post Exploring the Future of Cybersecurity in a ... Read More
Revolutionizing Cloud Security with Sweet Security
Cloud computing has transformed the way businesses operate by offering scalability, flexibility, and cost savings. However, with these advantages come significant security challenges. Protecting sensitive data in the cloud is not just about preventing breaches; it’s about understanding the environment […] The post Revolutionizing Cloud Security with Sweet Security appeared ... Read More
The Key to Preventing EchoSpoofing Phishing Attacks
One of the most pervasive and pressing challenges for organizations remains securing email communication against sophisticated phishing attacks. The recent Proofpoint email routing flaw, exploited in the EchoSpoofing campaign, underscores the urgency of this issue. This attack leveraged the inherent […] The post The Key to Preventing EchoSpoofing Phishing Attacks ... Read More
Revolutionizing Browser Security for the Modern Enterprise
Browsers have become the cornerstone of enterprise productivity, acting as gateways to essential applications and services. However, with this increased reliance comes heightened vulnerability. Traditionally browsers have lacked the robust security controls that have been applied to endpoints and networks. […] The post Revolutionizing Browser Security for the Modern Enterprise ... Read More
Extending Modern Identity Protection for Comprehensive Security
TechSpective Podcast Episode 134 There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, etc. What we don’t talk about nearly as […] The post Extending Modern Identity Protection for Comprehensive Security ... Read More
How NinjaOne’s New MDM Capabilities Transform IT Management
IT security teams are tasked with protecting an increasingly mobile work environment—managing a myriad of devices efficiently and securely. Addressing this need, NinjaOne has launched its new Mobile Device Management (MDM) capabilities, marking a significant milestone in their mission to […] The post How NinjaOne’s New MDM Capabilities Transform IT ... Read More
Enhancing Enterprise Browser Security
TechSpective Podcast Episode 133 Nick Edwards, Vice President of Product Management at Menlo Security joins me for this insightful episode of the TechSpective Podcast. Nick brings decades of cybersecurity experience to the table, offering a deep dive into the […] The post Enhancing Enterprise Browser Security appeared first on ... Read More
Syxsense: Leading the Charge in Automated Endpoint Security
Syxsense is making significant strides in enhancing its capabilities and expanding its market reach. Recently, the company rolled out new remote monitoring and management features aimed at supporting Managed Service Providers (MSPs). This new functionality enables MSPs to integrate seamlessly […] The post Syxsense: Leading the Charge in Automated Endpoint ... Read More
AI and Automation: A Double-Edged Sword in Cybersecurity
In recent years, the landscape of cybersecurity has undergone significant transformation, particularly with the adoption of artificial intelligence (AI) and automation by both defenders and attackers. The ReliaQuest Annual Cyber-Threat Report: 2024 highlights an alarming trend: threat actors are increasingly […] The post AI and Automation: A Double-Edged Sword in ... Read More