Sponsors

Internet of Things Concept - Tree

PKI Points the Way for Identity and Authentication in IoT

Modern enterprise networks are populated by both people and, increasingly, “things.” But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security.

Cyber lock concept

Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience

In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. We also talk about how better instrumenting of information security can help companies get a grip on fast-evolving cyber risks like human-directed ransomware campaigns.

woman working from home with laptop cellphone

With Remote Work: MFA Makes Everyone Happy

The sudden shift to remote work poses two challenges to organizations: fending off cyber attacks and keeping your remote workers productive, according to LogMeIn’s Rachael Stockton in this opinion piece. Multi-factor authentication offers one solution.

Eliminate the Password, Eliminate the Password Problem.

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there.

software application

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

In this week’s episode of the podcast (#168), sponsored by Signal Sciences, Chris Eng of Veracode joins us to talk about the 10th annual State of Software Security Report and the problem of application security debt. Also, Brendan Macaraeg of Signal Sciences talks about the expanding landscape of web application attacks and defenses.