This is hardly the type of advertising you’d expect to see around businesses in your community as summer heats up and Americans begin the slow process of venturing out into a post-COVID consumer environment. Although the highly publicized ransomware cyber attack against Colonial Pipeline in May 2021 hit most of our feeds, including mine, I still did not feel like this type of cyber attack would affect the types of smaller scale consumer activities that I depend on.
Cloud Infrastructure Entitlements Management (CIEM) - Why Identity Management in the Cloud is Difficult
In the cloud, physical borders have disappeared and identity has become the new perimeter defense. Conventional IAM solutions were designed to control human access to a limited set of systems and applications deployed in a corporate data center. With cloud infrastructure, IAMs must control and track access privileges for human and service identities across an ever-changing variety of cloud services.
Response Time to Critical Vulnerabilities as a New Security Metric
The Colonial Pipeline Hack and the Possibility of a Passwordless Future
Launch Day Keynote Speaker - Bryan Ware, Next5 Founder & President
We are extremely excited and honored to announce our keynote speaker for Launch Day, Bryan Ware.
Bryan Ware is a highly regarded technology leader and innovator, having started companies, patented technologies, raised venture and private equity, and recently served as the Nation’s lead cybersecurity executive at CISA. Bryan is currently the President of Next5, a boutique technology company, ensuring US leadership in critical and emerging technologies including AI, quantum, space, bio, and more. He serves on the World Economic Forum’s Global Future Council on Cybersecurity and as an advisor to technology companies and investors.
Cyberstanc Introduces Newest Addition - RIPx!
Introducing our newest addition RIPx for the community!
RIPx is non-traditional online anti-malware detection specialized for Ransomware detections.
It provides a complete multi-dimensional detection service sneak preview of our scrutiny engine and Swatbox. It analyzes and collects static and dynamic behavior data of files by simulating the file execution environment as well as combining it with Swatbox internal Threat Database to discover unknown threats in seconds.