Telegram's Encryption Controversy Explained | Must Watch!

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...
Is Google a Monopoly? Breaking Down the Latest Accusations

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
Going beyond 'SBOM' to secure software supply chains by Byron Acohido

Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure

President Biden’s call for the mainstreaming of Software Bill of Materials (SBOMs) is a major step forward. Related: Europe mandates resiliency Requiring a formal inventory of all components, libraries and modules in ...

Unlocking the Secrets of Non-Human Identities

TechSpective Podcast Episode 136   There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...

Exploring the Future of Cybersecurity in a SaaS-Driven World

TechSpective Podcast Episode 135   In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three ...
BTS #36 - Supply Chain Policies - Stewart Scott, Trey Herr

BTS #36 – Supply Chain Policies – Stewart Scott, Trey Herr

| | Podcasts
Stewart and Trey join us to talk about driving cybersecurity policies for the nation, what makes a good policy, what makes a bad policy, supply chain research and policies, and overall how ...
How Active ASPM augments application security by Byron Acohido

Black Hat Fireside Chat: Here’s how ‘Active ASPM’ is helping to triage and remediate coding flaws

Application Security Posture Management (ASPM) arose a few years ago as a strategy to help software developers and security teams continually improve the security of business applications. Related: Addressing rising cyber compliance ...
MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024: GenAI is  very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency ...

Application Security Check Up