
Australia
SecurityGigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability
Global survey shows why you fear what you can't see: Confidence in security posture soars but so do worries about unseen vulnerabilities.
Karl is a lead writer on cloud security for TechRepublic, specializing in enterprise security risks, strategies, products, threats, trends and technologies for securing organizations. After graduating from Florida State University, he worked for the Tampa Tribune, and radio and TV stations in Tallahassee before moving to Boulder, Colorado. After receiving an MFA in dramatic writing from Brooklyn College he became a journalist and wrote for several years for publications covering the automotive, industrial chemical, internet tech and consumer marketing verticals. He has written for Adweek, Brandweek, The Chemical Market Reporter and MediaPost, and was also the public affairs officer at the NYU Tandon School of Engineering for six years prior to coming to TA.
ExpertiseYubiKeys are my favorite tech at this point because of the proliferation of threats directred at idenity access. While there are numerous protection techs and password management platforms, including passkeys, a device-centered encrypted key is the sine qua non for me. Also bicycles and guitars.
Personal Quote80% of success is showing up - Woody Allen
Global survey shows why you fear what you can't see: Confidence in security posture soars but so do worries about unseen vulnerabilities.
Analysis of 700,000 real-world attacks shows how memory attacks evade protections and suggest mitigations.
New research on operational technology vulnerabilities by Armis found that 56% of engineering workstations have at least one unpatched critical severity.
The FIDO Alliance’s Andrew Shikiar explains how passkeys are quickly replacing passwords as the next-generation login, a low friction, high security protocol for any device.
Pro-Kremlin groups Anonymous Sudan, Killnet and Clop have other motivations than just hacktivism as they widen their attack field beyond political targets.
The company’s CTO of its Prisma Cloud says that when the software development process meets continuous integration and development, security must be efficient and holistic.
ChatGPT use is booming at enterprises. Saying "no" to employees who want to use ChatGPT is a short-term answer, per Netskope, whose solution uses data insights to say "yes," "no" and "sometimes."
Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of use across devices.
Threat intelligence firm Abnormal Security is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense.
The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail.