Everyone knows the OWASP Top 10 lists of application security and API risks. But what about #11 and beyond - aren't those key priorities, too? Matt Tesauro of Noname Security talks about "Beyond the Top 10" and relates it back to mitigating the Log4j zero-day vulnerability.
Identity: In most instances it can be an asset. But occasionally, left improperly secured, it can be a roadblock for an enterprise. Wade Ellery of Radiant Logic explains the Identity Data Fabric and how it can help enterprises solve major business problems.
COVID-19 has been a game changer - not just in how government agencies deliver services, but in how fraudsters try sneaking illegal access to them. Ryan Schaller, senior CIAM developer specialist at Okta, discusses these new faces of fraud and what state and local governments can do to combat them.
Digital transformation has not been lost on higher education. But IAM approaches are often homegrown and antiquated. CIAM offers a new approach that can streamline and optimize the student digital experiences, says Okta's Ryan Schaller.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
One of the effective ways to tackle AML fraud is to leverage technologies such as behavioral biometrics and device biometrics, says Charles Subrt, director of the fraud and AML practice at Aite-Novarica Group.
The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
In this session Akamai will share some of the research and insights into the tools, tactics, and techniques attackers are using to launch their malicious onslaughts while remaining under your defensive radar.
Attackers are innovating constantly to try to increase their success rates as they work to evade detection and mitigation technologies in the kill chain. But the future isn’t just more and more attacks.
While overregulating the cryptocurrency space is not advisable, it is important for the Biden administration to look into the areas in which cryptocurrencies pose the greatest risks, says Nichole Dennis, director and government relations specialist with Cybercrime Support Network.
Dr. Frances Undelikwo, divisional head of IT and operational risk management at Fidelity Bank in Nigeria, says she found her passion by trying out different departments and fields under information security. She discusses her career path and current role.
How does one begin to secure the digital transformation journey in two legacy enterprises? Kush Sharma, principal for Sharma and Company and former CISO for the city of Toronto, shares his experience and offers advice on investing in and integrating technologies.
Digital transformation and the advent of continuous delivery in software engineering has created a new demand for continuous security. This evolution requires a shift of mindset for most security teams, says Karl Mattson, CISO of Noname Security. He discusses the challenges and benefits.