BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address...
It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as established enterprise developers. The developers that incorporate these open source components need to somehow stay on top of the many licensing issues and security vulnerabilities...
Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for users – especially those who seek better security and those on the move with their mobile devices.  Lior is the CEO and Chairman of Cyren, a leading provider of cloud-based security...
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their methodology...
The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common usage in our daily lives. Once Apple introduced fingerprint sensing in the iPhone 5S, biometric sensing entered the mainstream and is now utilized daily by millions of mobile device users. Jason Chaikin,...
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by malware....
Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security threats. What they are often lacking, however, is enough trained security personnel to execute the necessary actions. What they are really lacking is time – and when it comes to responding to...
More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In general, data privacy is becoming a greater concern for most enterprises. Cliff White, the CTO of Accellion explains how his company’s kiteworks platform secures these documents, while at the same...
There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers still implement these functions by building them from scratch or using very primitive identity frameworks. Matias Woloski, the CTO & Co-founder of Auth0, wants to make it much simpler to not only implement, but to...
As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his company’s goal is to make these breaches irrelevant by efficiently encrypting data wherever it may be, so that even if there is a security breach, the data...