SMS Pools and what the US Secret Service Really Found Around New York
Last week the United Nations General Assembly kicked off in New York City. On the first day, a strange US...
Last week the United Nations General Assembly kicked off in New York City. On the first day, a strange US...
Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations...
Why Are Non-Human Identities Crucial for Cybersecurity? How do organizations ensure the security of machine identities? Non-Human Identities (NHIs) provide...
How Can Organizations Adapt Their Security Strategies for Hybrid Cloud Environments? Organizations face unique challenges while managing their hybrid clouds....
What Makes Non-Human Identities Crucial in Cloud Security? How do organizations manage the unique challenges posed by non-human identities? Non-human...
Creator, Author and Presenter: Phillip Ward, Canva Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference...
Why Are Non-Human Identities the Unsung Heroes of Asset Security? Where digital transformation drives business innovation, the necessity for robust...
How Can Scalable Security Transform Your Business? Where businesses rapidly migrate to the cloud, scalability in security is more crucial...
Why Are Non-Human Identities the Key to Proactive Compliance in Cloud Security? Where data breaches and cyber threats have become...
Creators, Authors and Presenters: Norman Sadeh And Lorrie Cranor, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s...
What is Risk-Based Authentication (RBA)? Okay, so you're probably wondering what Risk-Based Authentication (rba) actually is, right? It's not as...
Are You Prepared for the Next Cybersecurity Threat? Where cyber threats evolve faster than yesterday’s news, staying ahead requires a...
Why Are Non-Human Identities Crucial in Cybersecurity? How often do we consider machine identities when contemplating cybersecurity measures? It’s clear...
Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding...
CISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack...