Virtual visits transformed the healthcare industry, making care accessible to remote patients online. This change, while beneficial, also meant that millions of healthcare workers and patients began to exchange sensitive healthcare issues over unvetted cloud apps that weren’t built to secure health...
In this talk Sean explores what it means to be a modern technology leader and how we can drive the DevSecOps transformation. Sean will share his thoughts on modern leadership and DevSecOps and then sit down with Tom Field to diver deeper into these and other pressing topics for security leaders.
Key...
DevOps-driven adoption of new
technologies and processes
may mean security is an afterthought
and can expose new
gaps in security coverage and
risk management.
Download this whitepaper which provides an overview of what DevSecOps is and how organizations can adopt its
practices in conjunction with technologies...
In order to give you a jump start on investigations in your own AWS environment, Expel has mapped the AWS services in which these tactics often originate (thanks, crafty attackers) along with the API calls the attackers make to execute on said techniques.
Download this guide for a breakdown of the most popular...
Application security is complex, difficult, and costly. In today’s fast-moving digital economy, where speed to market is critical, most development teams do not have the resources or time to sufficiently protect against the onslaught of attacks that can disrupt their applications. Even while many of the security...
Did you miss ESET's Lukas Stefanko presentation on Stalkerware at RSA this year?
It looked at our analysis of dozens of Android stalkerware families, which are often flagged as undesirable or harmful by most mobile security solutions. Many of these apps also exhibit serious security and privacy issues that could...
How can you possibly protect your applications if you can’t react with the same speed?
Real-time attack prevention requires a security solution that enables both speed of visibility and control.
API-enabled security workflows are critical to gaining visibility and fast response to threats: alerts and...
The cybersecurity adversaries embrace the concept of "shift left," so shouldn't the defenders? Shivajee Samdarshi of Venafi discusses the implications and mindset change for software development and engineering teams.
n this talk Sean explores what it means to be a modern technology leader and how we can drive the DevSecOps transformation. Sean will share his thoughts on modern leadership and DevSecOps and then sit down with Tom Field to diver deeper into these and other pressing topics for security leaders.
Key...
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.
We’ve gone from a remote workforce to “work from anywhere.” How does this create new security challenges regarding the broad and unrestricted accessing of cloud apps? Sasi Murthy of Netskope discusses the path to zero trust data protection.
With more and more companies moving to DevOps, that statistic is likely to grow due to the increased demand for more applications faster meaning more chance for error. The good news is that these application vulnerabilities are extremely preventable through on-demand focused interactive lessons to learn how to code...
Forrester Research Inc. first coined the term “zero-trust” in 2010. A decade and a pandemic later, with businesses implementing hybrid multi-Cloud environments, identity and access management can no longer be considered optional. Extending VPN protection is not enough.
Risk-based authentication enhances both...
2020 has ushered in rapid change in everything we do, from banking and grocery shopping, to working and learning from home. New technologies such as cloud and microservices as well as practices such as DevOps help organizations adapt to these changes. But these new technologies introduce their own challenges,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.