WebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways

WebAssembly: The Fly on the Wall Delivering Malware Past Secure Web Gateways

‘Last Mile Reassembly Attacks’ evade every Secure Web Gateway in the market and deliver known malware to the endpointAt DEF CON 32, SquareX presented groundbreaking research curating vulnerabilities in Secure Web Gateways (SWGs) ...
Revolutionizing Cyber Defense: An In-Depth Look at SquareX with Jeswin Mathai

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions ...

Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX

In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe ...
Make Security Simple: Streamline Policies in Unified SASEBalancing Configuration and Control is critical for reducing security risks and management complexity

Make Security Simple: Streamline Policies in Unified SASEBalancing Configuration and Control is critical for reducing security risks and management complexity

Introduction The Secure Access Service Edge (SASE) service, along with its associated architecture, comprises a powerful amalgamation of multiple security components. These include a stateful inspection firewall, Intrusion Detection and Prevention System ...

The CISO Perspective 2023-02-20 09:19:54

At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and… ...
SASE: Is it Just Another Cybersecurity Buzzword?

SASE: Is it Just Another Cybersecurity Buzzword?

In this sponsored episode co-host Tom Eston discusses SASE (Secure Access Service Edge) and if its more than just the latest cybersecurity buzzword with Carlos Salas from NordLayer. Topics include: – What ...
Fortinet, SASE, Opal, access privileges, cloud security, GenAI, generative AI cloud compromise LLM

Teleport Extends Access Management Gateway to Software

Teleport today made available an update to its access management platform that can now also apply an identity to software. In addition, Teleport 9 makes a Teleport Desktop Access module generally available ...
Security Boulevard
historic-columbia-river-highway-hairpin-curve-on-the-rowena-loops-4a28c8-1600

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices ...

Why ransomware is now beyond a CISO concern

In an unprecedented move, President Biden publicly and privately has been putting pressure on global leaders for harboring known cybercriminals who have launched attacks on U.S.-based organizations. FBI Director Christopher Wray likened ...

Application Security Check Up