Today's networks are transforming digitally before our eyes. Organizations across the globe are either cloud-first or cloud-next, and are moving their workforce, workplace, and workloads to cloud service applications and infrastructure.
It's an increasingly common story: Live Oak Bank was growing its cloud footprint and had specific needs for a cloud security provider. Bank CISO Thomas Hill is joined by Orca Security CEO Avi Shua to detail the case study and key lessons learned.
Digital wallets, super apps and digital IDs all have substantial roles in the new consumer landscape. And identity proofing is critical for the fraud-prevention success of each of these emerging technologies, says Shai Cohen of TransUnion.
It isn't that we struggle to define the zero trust security model. It's that we ignore the real challenge, says Jack Miller of Menlo Security. We need to shift our view of authentication and access from "innocent until proven guilty" to "guilty until proven innocent."
First you had 'shadow IT,' then 'shadow cloud.' Now enterprises are encountering 'shadow APIs' - and the lack of visibility into these interfaces is causing new, often overlooked cybersecurity vulnerabilities, says Subbu Iyer of Cequence Security.
Brand impersonation - it isn't just a marketing or reputational issue. It's an InfoSec problem, says Shashi Prakash, CTO and co-founder of Bolster. He describes the growing problem and why security is best positioned to lead detection and response.
Vulnerability management is vulnerable. This year's transformation has revealed new gaps in processes and tools, inspiring a new evolution to the discipline of Vulnerability Management, Detection and Response. Mehul Revankar of Qualys discusses VMDR and how to embrace it.
Visibility - lack of - has been the common complaint of financial services enterprises newly embracing the cloud. But Terry Ray if Imperva offers new strategies not only for tackling visibility, but for taking advantage of new, cloud-enabled security capabilities.
Perhaps more than any sector, healthcare has been the greatest beneficiary of digital transformation initiatives in 2020. It also has been among the top targets of cyber adversaries. Imperva's Terry Ray discusses how to improve security and compliance amidst transformation.
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
DDoS, bad bots and automated attacks - these are the common strikes against organizations that support ecommerce. How can they fend off these attacks without impacting normal human traffic? Edward Roberts of Imperva shares strategies and solutions.