Girard Kavelines recently published a reaction video on the latest advancements in SquareX Browser Detection technology. He explores the intricacies of browser detection techniques and their implications for web developers and businesses reliant on accurate user data. For additional insights from Security Field Day 14, follow Girard Kavelines on LinkedIn.
Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken
Jack Poller critically evaluates Nile’s assertion that traditional LAN architecture is inherently flawed, suggesting the need for innovative enhancements in network design. He explores the implications of this viewpoint, highlighting potential areas for improvement to meet modern connectivity demands. For additional insights and coverage from Security Field Day 14, follow Jack Poller on Security Boulevard.
HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale
In a recent piece by Jack Poller, the focus shifts to HPE’s strategic direction post its acquisition of Juniper, highlighting its aim to enhance enterprise-scale security through AI-driven solutions. This approach signifies a pivotal shift towards integrating advanced artificial intelligence to improve security frameworks and network management. For further insights from Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.
SquareX at Security Field Day 14. Showcasing how SquareX Closes the SWG…
At Security Field Day 14, SquareX demonstrated its innovative approach to closing security gaps in Secure Web Gateways (SWG). Their presentation highlighted the pivotal enhancements and the robust architecture of their solution that defends against evolving cyber threats. For comprehensive coverage of SquareX’s presentation, watch our Tech Field Day social media channels!
DNS Must Be Secured Presented by Infoblox
DNS security is no longer optional. This service is not only being attacked by nefarious actors but it is also being leveraged in ways to compromise users and exfiltrate data. In this episode of the Tech Field Day podcast, brought to you by Infoblox, Tom Hollingsworth is joined by Jack Poller and Cricket Liu. They talk about the historical openness of DNS and how that has led to it becoming easy to see what users are doing and create ways to manipulate them. They discuss ways to secure the protocol and how companies like Infoblox are extending the capabilities for future security.
Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management
Jack Poller recently discussed 1Password’s expansion beyond its core password management capabilities, highlighting its strategic shift towards Extended Access Management. This evolution aims to provide more comprehensive security solutions that address various access control needs in an increasingly complex digital environment. For further coverage of Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.
Why DNS Is Still the Weakest Link in Modern Security — and How Infoblox Changes The Scene
DNS vulnerabilities remain a critical issue in cybersecurity, often serving as an initial attack vector for various threats. Infoblox is addressing these challenges by enhancing DNS security protocols and offering solutions that integrate seamlessly with existing enterprise systems, thereby improving resilience against attacks. Find more coverage of Security Field Day 14 by Kate Scarcella on LinkedIn!
Bridging the Trust Gap with 1Password
Tom Hollingsworth recently explored how 1Password can help bridge the trust gap in today’s security environment by providing robust password management solutions that enhance data protection and user trust. His insights point towards the increasing relevance of secure password vaults in maintaining privacy and integrity in digital transactions. For more coverage of Security Field Day 14, visit Security Boulevard.
Your Enterprise LAN Security Is a Problem—Nile Can Fix It
Tom Hollingsworth examines the significant challenges facing enterprise LAN security, highlighting how vulnerable traditional network infrastructures can be to sophisticated cyber threats. He introduces Nile, a new security solution that promises to address and mitigate these vulnerabilities effectively. For additional insights into Nile’s impact on enterprise security, visit Tom Hollingsworth’s coverage on Security Boulevard.
How HPE’s New Security Playbook Is Actually Stopping Threats
In this article following Security Field Day 14, Tom Hollingsworth examines Hewlett Packard Enterprise’s innovative approach to cybersecurity, detailing how their new security strategies are effectively mitigating threats. He highlights the integration of advanced tools and protocols that are setting new standards in the industry for protecting enterprise data assets. For additional insights into this topic, check out the coverage on Security Boulevard.
When “It’s Always DNS” Becomes Your Security Advantage
In his latest analysis, Jack Poller examines how the common adage “It’s Always DNS” can be turned into a strategic advantage for cybersecurity efforts. He discusses how DNS, typically a source of network issues, can also serve as a critical tool in identifying and mitigating security threats. For further insights about Security Field Day 14 and Infoblox, watch Security Boulevard!
The Metamorphosis of Trust
Kate Scarcella writes about 1Password’s presentation at Security Field Day 14 in this LinkedIn Pulse article. Their password management exemplifies the evolution of encryption, bridging the gap between enterprise and consumer trust models with its dual-key model and zero-knowledge architecture.
Enhancing Security in the Age of AI and Agents
The Techstrong Gang explores the increasing complexities of enterprise security in an era dominated by advanced artificial intelligence and automated agents. They discuss the need for evolving security strategies to safeguard data and infrastructure against sophisticated threats enabled by these technologies. During the conversation, Stephen Foskett compares the approach of NetApp as seen at the recent INSIGHT event, for data protection. The topics presented at Security Field Day are also covered, including SquareX, as well as the recent Microsoft Security event.
The Endpoint Has Moved to the Browser — Your Security Tools Haven’t
Jack Poller discusses the shift of endpoint computing to the browser in a recent article, highlighting how traditional security tools are lagging behind in adapting to this change. He explains that as applications and user data migrate from desktops to web platforms, the paradigm for security must evolve to address new vulnerabilities and threats. This was the topic of the SquareX presentation at Security Field Day. For more coverage on this topic, follow Jack Poller on LinkedIn.
Your EDR Can’t See Inside Browsers — What SquareX Proved at Security Field Day 14
Marian Newsome recently highlighted a critical gap in cybersecurity: most Endpoint Detection and Response (EDR) systems fail to monitor activities within web browsers. During a presentation at Security Field Day 14, she discussed how SquareX’s Pro offered an innovative solution to this oversight, ensuring enhanced security monitoring. For additional insights into this topic, follow Marian Newsome’s coverage on LinkedIn Pulse.
The Principle of the Hidden Key
1Password’s approach to agentic AI security emphasizes deterministic authorization, ensuring every action is traceable and secure. Their Security Principles for AI prioritize keeping secrets secret, ensuring auditability, and minimizing exposure. This is implemented through the Model Context Protocol (MCP), which allows AI to interact with systems without accessing credentials, and partnerships like Browserbase for secure autofill. Read more coverage of Security Field Day by Vriti Magee on her blog!
When Networks Learn to Flow
Nile’s Zero Trust architecture simplifies enterprise security by integrating it directly into the network, eliminating the need for complex overlays. Their approach, based on the “Power of Zero,” emphasizes Zero Trust, Zero Touch, and Zero CapEx, ensuring every device is secure by default and operations are autonomous. By focusing on identity-based security and removing unnecessary human dependency, Nile aims to make network security as seamless as possible. Read more Security Field Day coverage on Vriti Magee’s blog!
Inside the Tab
Vriti Magee follows SquareX’s Security Field Day presentation on Browser Detection and Response. They focused on understanding browser-based attacks by observing user interactions within the browser. Their architecture, consisting of a browser extension and a web policy platform, enables real-time threat prevention by enforcing policies at the browser runtime. This shift from control to understanding emphasizes the importance of context-based visibility in cybersecurity.
My First Cartel Meeting (and What It Taught Me About DNS)
Vriti Magee shares a fascinating narrative of an unconventional encounter that illuminated the complexities of DNS, showing its pivotal role in online security and network operations. Through this personal experience, Vriti highlights the significance of understanding DNS not just as a technical component, but as a crucial part of broader cybersecurity strategies. For more insights following Security Field Day, subscribe to Vriti’s blog!
68 Days Ahead: Turning DNS Data into Compliance and Cyber Resilience
Marian Newsome explores how utilizing DNS data can enhance compliance and cyber resilience, providing organizations with a strategic advantage in preempting security threats. Through efficient data analysis, businesses are not only able to meet regulatory requirements but also fortify their defenses against potential cyberattacks. Discover more insights on this topic by Marian Newsome on LinkedIn Pulse.








