Syndicated Blog

Security Archives | TechSpective
a unique perspective on technology

Identities Aren’t for Sale: TSA Biometrics Technology and the Need for Consumer Consent

Earlier this summer, over a dozen bipartisan senators signed an amendment to the FAA reauthorization bill, calling for a pause on additional rollout of the TSA’s facial recognition technology until the program ...

Unlocking the Secrets of Non-Human Identities

TechSpective Podcast Episode 136   There’s one area that often flies under the radar, yet poses a critical cybersecurity threat to organizations: non-human identities. These programmatic access credentials—like API keys and service ...

Deepfakes Are Having a Deeper Impact on These Three Industries

Artificial intelligence (AI) is having a profound impact on business, and it hasn’t all been positive. Aside from automating business processes and providing better business intelligence, AI has also given criminals a ...

Exploring the Future of Cybersecurity in a SaaS-Driven World

TechSpective Podcast Episode 135   In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three ...

Changing Tack: Email Threat Trends in Q2 2024

Gaining insight into cybercriminal activity is no mean feat. Cybercriminals are notoriously secretive, so we must rely on industry research. For example, the yearly Verizon Data Breach Investigation Report explores the latest ...

Revolutionizing Cloud Security with Sweet Security

Cloud computing has transformed the way businesses operate by offering scalability, flexibility, and cost savings. However, with these advantages come significant security challenges. Protecting sensitive data in the cloud is not just ...

Democratizing Cybersecurity: The Strength of Community Collaboration

Cybersecurity continues to transcend the realm of specialists, becoming a paramount concern for individuals and organizations. As cyber threats escalate, the need to safeguard our digital existence has birthed the concept of ...

The Key to Preventing EchoSpoofing Phishing Attacks

One of the most pervasive and pressing challenges for organizations remains securing email communication against sophisticated phishing attacks. The recent Proofpoint email routing flaw, exploited in the EchoSpoofing campaign, underscores the urgency ...

Revolutionizing Browser Security for the Modern Enterprise

Browsers have become the cornerstone of enterprise productivity, acting as gateways to essential applications and services. However, with this increased reliance comes heightened vulnerability. Traditionally browsers have lacked the robust security controls ...

Extending Modern Identity Protection for Comprehensive Security

TechSpective Podcast Episode 134   There is a lot of talk about identity protection–password policies and best practices, requiring two-factor or multifactor authentication, user credentials exposed in phishing attacks and data breaches, ...

Application Security Check Up