Is your workforce mostly remote? With the state of things right now, do you anticipate them working remotely more often? If so, how does that affect your security perimeter? Does it even exist now? Tom Hollingsworth looks at the CASB solution from BitGlass and how they can help ensure your users are protected no matter which coffee shop their working from.
How can you track down all the devices in your network that you don’t know about? How can you ensure they aren’t security risks or potential threat vectors? Tom Hollingsworth takes a look at PathSolutions and their new TotalView Security Operations Manager and how it can help you figure out what’s hiding just out of plain sight.
How do you prove who you are? Are you going to rely on some big company to tell other people that you are you? What if we could validate identity with the companies and software that know us the best and still keep it all secure? Tom Hollingsworth takes a look at Identiq, a new company looking to create a peer-to-peer identity validation network.
The rise of cheap but capable ARM processors, and the saturation of internet connectivity with Wi-Fi and cellular, has led to the rapid spread of Internet of Things devices. IoT can now be found across the consumer and enterprise landscape, finding itself particularly well suited for industrial, campus, and municipal applications. But has security risen to meet the sudden influx of IoT devices? Not quite. Rich Stroffolino breaks down the problem, why enterprises will eventually catch up, and what the regulatory landscape might look like when they do.
Is your monitoring dashboard full of infuriating red lights? Maybe it’s all green without the details to assure you everything is secured? How would you know if what you saw was accurate? Tom Hollingsworth takes a look at Brinqa and how their cybersecurity risk graph gives you all the information you need without making you stop to look at what you are missing.
How do you ensure that IoT devices are secure? How can you even be sure that nothing has been done to them when they’re outside of your control? How do you keep track of all the bugs and updates and patches? Tom Hollingsworth takes a look at Jitsuin and their Archivist platform and how it can help you solve your IoT issues with exciting new technology.
If you secure something, how do you know it’s safe? Likewise, how can you ensure the things you’re monitoring are truly safe? You need a tool that works on both sides of the house to keep tabs on everything and keep it all safe. Tom Hollingsworth takes a look at how Sysdig has created a platform to help you secure your DevOps and container environments while also keeping them visible.
What evil lurks inside your peripherals? Would you even know what to look for? Tom Hollingsworth talked to Sepio Systems at RSA Conference this year to learn all about how they’re hunting for malicious hardware hiding in your organization.
Welcome to Tomversations! This episode covers SD-WAN and the newest aspect to the technology – Secure Access Service Edge (SASE).
Are you leaving an open door into your software applications? Have you checked to see how secure your APIs are? Tom Hollingsworth takes a look at the explosion of APIs and how Data Theorem can help you ensure these portals into your system are locked down.