-
-
-
Identity is the new hack. Cybersecurity architects, security operations center analysts, and C-suite IT executives are all struggling to maintain security posture and control with the growing use of modern AI tools by bad actors. Fundamentally, enterprise security now starts with identity access management, but it must evolve to stay one step ahead of an escalating threat landscape. With these points in mind, I will dive deeper into the challenges of securing identity and highlight what I find compelling about Cisco Duo’s approach after spending time with its leadership team late last year. Identity Is The New Hack Numerous published research reports indicate that the lion’s share of today’s security…
-
Last year, a group of researchers at UC San Diego and the University of Maryland revealed a startling discovery utilizing an inexpensive satellite receiver system made with off-the-shelf components – not purpose-built spyware. Following three years of data collection and analysis from a vantage point in La Jolla, the team was able to collect a myriad of confidential data from geosynchronous satellites. As mobile network operators, including AT&T, T-Mobile, Vodafone, and others, adopt non-terrestrial networks to expand coverage, the study highlights the need for stronger security provisions. In this research note, I will outline the types of confidential data intercepted, the initial responses from operators, and what should be considered…
-
Black Hat USA 2025 returned to the Mandalay Bay Convention Center in Las Vegas, marking its 27th year in North America. With more than 22,000 participants, the event unwound over six days with an agenda that focused on deep dives into cybersecurity, underlying research efforts, practitioner training, vendor summits, technical demonstrations and social events. The rise of new types of attacks in the threat landscape is not slowing down, but accelerating at a monumental pace, fueled by the same modern AI tools that defenders are using. Bad actors are increasingly leaning into generative AI to dramatically improve the sophistication of phishing campaigns and create new forms of malware. They are…
-
Gigamon held its fifth annual Visualyze Bootcamp virtual event over three days in early September. Since its founding 20 years ago, the company has developed a deep observability pipeline that leverages network intelligence to detect threats often missed by traditional security tools. The Bootcamp serves as an opportunity for Gigamon to share its industry and technical knowledge with customers. Most organizations using cloud services employ a multi-cloud model to benefit from competitive pricing and access to best-of-breed service offerings. Additionally, the trend toward containerization and virtualization aims to enhance operational and cost efficiencies. However, hybrid cloud deployments can introduce complexities that require careful management. The Bootcamp addressed many of these challenges, with…
-
Bio: Will Townsend is a frequent Forbes contributor and advises some of the largest networking and telecommunications companies in the world. His more than thirty years of experience spans tenures spent with iconic companies such as Dell & Hewlett-Packard, serving in several senior level roles including sales, marketing, product management, and business development. Presently, Mr. Townsend manages the networking infrastructure and security practices for Moor Insights & Strategy, an analyst firm regarded as a leader in the technology sector based on principal and founder Patrick Moorhead’s #1 ranking by ARInsights. Mr. Townsend also ranks consistently within the top 100 technology analysts in the world according to ARInsights and by same…















