dcsimg

Sean Michael Kerner - Article Archives - Page 1

How Netflix Secures AWS Cloud Credentials

August 10, 2018
At Black Hat USA, Netflix engineer explains how the streaming media giant uses cloud logs to spot security issues.
READ MORE

10 Vendors Making News at Black Hat USA 2018

August 9, 2018
New security products unveiled at the Black Hat USA 2018 conference include EDR, cloud security, IoT security, DevSecOps tools and more.
READ MORE

How Blackberry Does Secure Release Management

August 9, 2018
In a Black Hat USA session, BlackBerry's Product Security Operations Team director explained how organizations can improve their software release process to reduce vulnerabilities.
READ MORE

Demisto Demonstrates Tool to Validate IOC Detection at Black Hat

August 8, 2018
Does your EDR effectively detect the indicators of compromise it is given? That's the goal of a new project set to be released at Black Hat USA 2018.
READ MORE

Top 10 Talks to See at Black Hat USA 2018

August 6, 2018
Security researchers, vendors and IT pros are headed for Las Vegas for Black Hat USA 2018. Here are 10 talks that shouldn't be missed.
READ MORE

With So Many Eyeballs, Is Open Source Security Better?

July 10, 2018
VIDEO: Dirk Hohndel, VP and Chief Open-Source Officer at VMware, talks about how dev security should  be done, whether the code is open source or proprietary.
READ MORE

Where To Invest Your Cybersecurity Budget

July 3, 2018
VIDEO: Tom Parker, Managing Director of Accenture Security, discusses how organizations should be budgeting their cybersecurity dollars - and making the most of what they already have.
READ MORE

What Metrics Should Enterprises Focus On to Improve Cybersecurity?

June 25, 2018
VIDEO: Dmitri Alperovitch, co-founder and CTO of CrowdStrike, discusses why simply focusing on malware prevention isn't enough for modern cybersecurity.
READ MORE

Container and Kubernetes Security: It's Complicated

June 13, 2018
While there are a lot of things that containers do to help improve security, there are still some missing pieces.
READ MORE

An Inside Look at OpenStack Security Efforts

June 1, 2018
OpenStack is a widely deployed open-source cloud platform, but isn't necessarily secure by default. Learn what leading OpenStack experts said is needed to help make your cloud secure.
READ MORE

How to Secure Edge Computing

May 29, 2018
As cloud computing moves to the edge of network, organizations will face new security challenges.
READ MORE

Where Does SIEM Fit in an Enterprise?

May 16, 2018
VIDEO: Fortinet CISO Philip Quade details his firm's strategic approach and explains SIEM's core security role.
READ MORE

How the Kubernetes Security Response Team Works

May 11, 2018
VIDEO: Brandon Philips, former CTO of CoreOS, talks about how the Kubernetes security team works and responds to vulnerability reports.
READ MORE

How VMware Organizes Its Security Products

April 30, 2018
VIDEO: Tom Corn, Senior Vice President and GM of Security Products at VMware details the core pillars of cyber-security at his company.
READ MORE

Why Avast Gives Security Software Away for Free

April 27, 2018
VIDEO: Ondrej Vlcek, CTO of Avast, discusses how his company's business model works and why machine learning for anti-virus technology is here to stay.
READ MORE

How F5 Networks' CISO Defends the Enterprise

April 23, 2018
VIDEO: Mike Convertino, CISO of F5 Networks, discusses the technology tools and human resources he uses to help secure his network and inform F5's product development.
READ MORE

RFP Lessons Learned from Monty Python: Oracle CSO

April 19, 2018
At the RSA Conference, Oracle's CSO used humorous anecdotes to offer best practices on what to avoid when building a security RFP.
READ MORE

AWS Details 5 Steps to Improve Cloud Application Development Security

April 19, 2018
At the RSA Conference, AWS CISO Stephen Schmidt detailed best practices that can help reduce risk and improve cloud application resiliency.
READ MORE

IBM Releases Tools to Outsmart Machine Learning

April 18, 2018
[VIDEO] Artificial Intelligence can be used to improve cybersecurity, but IBM warns that attackers can inject malicious data to attack systems.
READ MORE