Remove cloud-security why-a-native-first-approach-is-key-to-cloud-security
article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

I attended my first one in 2004, while covering Microsoft for USA TODAY. Rising from the din of 625 vendors, 700 speakers and 26,000 attendees came the clarion call for a new tier of overlapping, interoperable, highly automated security platforms needed to carry us forward.

Mobile 238
article thumbnail

Zero Trust Is (also) About Protecting Machine Identities

Security Boulevard

Move towards an identity-based Zero Trust cybersecurity approach. A key principle of a Zero Trust architecture, as defined in NIST SP 800-207 , is that no network is implicitly trusted. This includes traffic between devices, containers, APIs and other cloud workloads. Machine identity is key component of Zero Trust.

IoT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: RSAC 2023 roundup – evidence of ‘stronger together’ innovation takes shape

The Last Watchdog

Related: Demystifying ‘DSPM’ Rising from the din of 625 vendors, 700 speakers and 26,000 attendees came the clarion call for a new tier of overlapping, interoperable, highly automated security platforms needed to carry us forward. One nascent approach that shows promise: cloud native application protection platform ( CNAPP.)

Mobile 212
article thumbnail

Is Your Security Stack and Legacy Tech Keeping Pace With Your Business?

CyberSecurity Insiders

Knowing When to Move Threat Detection, Investigation and Response (TDIR) to the Cloud. In response to this challenging security landscape, investment trends have also changed. Gartner recently reported that there has been a 41% increase in cloud security spending by CIOs over the past year. By Tyler Farrar, CISO, Exabeam.

article thumbnail

Why Businesses Can’t Afford Anything Less Than Zero Trust in IoT

Security Boulevard

Why Businesses Can’t Afford Anything Less Than Zero Trust in IoT. Considering the inherent insecurity of connected devices, the threats facing organizations today often involve weakly-defended IoT equipment as the first line of attack. 68% of IT and security professionals plan to use zero trust for device security; 42% actually do.

IoT 98
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it. Let's dive into it.

IoT 358
article thumbnail

Best Encryption Software for 2022

eSecurity Planet

Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice. This adds a vital extra layer of security. Some kind of cryptographic key is needed to both encrypt and decrypt the data. What is Encryption?