Security Archives | TechSpective
a unique perspective on technology
Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent
Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program ...
Unlocking the Secrets of Non-Human Identities
Tony Bradley | | Authentication, Blog, Entro Security, non-human identity, Podcasts, Security Awareness
TechSpective Podcast Episode 136 There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...
Deepfakes Are Having a Deeper Impact on These Three Industries
Artificial intelligence (AI) is having a profound impact on business, and it hasn’t all been positive. Aside from automating business processes and providing better business intelligence, AI has also given criminals a ...
Exploring the Future of Cybersecurity in a SaaS-Driven World
TechSpective Podcast Episode 135 In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three ...
Changing Tack: Email Threat Trends in Q2 2024
Gaining insight into cybercriminal activity is no mean feat. Cybercriminals are notoriously secretive, so we must rely on industry research. For example, the yearly Verizon Data Breach Investigation Report explores the latest ...
Revolutionizing Cloud Security with Sweet Security
Cloud computing has transformed the way businesses operate by offering scalability, flexibility, and cost savings. However, with these advantages come significant security challenges. Protecting sensitive data in the cloud is not just ...
Democratizing Cybersecurity: The Strength of Community Collaboration
Usman Chaudhary | | Blog, Cybersecurity, democratize, Endpoint Protection, security, Security Awareness
Cybersecurity continues to transcend the realm of specialists, becoming a paramount concern for individuals and organizations. As cyber threats escalate, the need to safeguard our digital existence has birthed the concept of ...
The Key to Preventing EchoSpoofing Phishing Attacks
Tony Bradley | | Blog, Business, EchoSpoofing, email security, Non-Repudiation, Phishing, risk management, zero trust
One of the most pervasive and pressing challenges for organizations remains securing email communication against sophisticated phishing attacks. The recent Proofpoint email routing flaw, exploited in the EchoSpoofing campaign, underscores the urgency ...
Revolutionizing Browser Security for the Modern Enterprise
Browsers have become the cornerstone of enterprise productivity, acting as gateways to essential applications and services. However, with this increased reliance comes heightened vulnerability. Traditionally browsers have lacked the robust security controls ...
Extending Modern Identity Protection for Comprehensive Security
TechSpective Podcast Episode 134 There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, ...