When “It’s Always DNS” Becomes Your Security Advantage

In his latest analysis, Jack Poller examines how the common adage “It’s Always DNS” can be turned into a strategic advantage for cybersecurity efforts. He discusses how DNS, typically a source of network issues, can also serve as a critical tool in identifying and mitigating security threats. For further insights about Security Field Day 14 and Infoblox, watch Security Boulevard!

The Metamorphosis of Trust

Kate Scarcella writes about 1Password’s presentation at Security Field Day 14 in this LinkedIn Pulse article. Their password management exemplifies the evolution of encryption, bridging the gap between enterprise and consumer trust models with its dual-key model and zero-knowledge architecture.

Enhancing Security in the Age of AI and Agents

The Techstrong Gang explores the increasing complexities of enterprise security in an era dominated by advanced artificial intelligence and automated agents. They discuss the need for evolving security strategies to safeguard data and infrastructure against sophisticated threats enabled by these technologies. During the conversation, Stephen Foskett compares the approach of NetApp as seen at the recent INSIGHT event, for data protection. The topics presented at Security Field Day are also covered, including SquareX, as well as the recent Microsoft Security event.

The Endpoint Has Moved to the Browser — Your Security Tools Haven’t

Jack Poller discusses the shift of endpoint computing to the browser in a recent article, highlighting how traditional security tools are lagging behind in adapting to this change. He explains that as applications and user data migrate from desktops to web platforms, the paradigm for security must evolve to address new vulnerabilities and threats. This was the topic of the SquareX presentation at Security Field Day. For more coverage on this topic, follow Jack Poller on LinkedIn.

Your EDR Can’t See Inside Browsers — What SquareX Proved at Security Field Day 14

Marian Newsome recently highlighted a critical gap in cybersecurity: most Endpoint Detection and Response (EDR) systems fail to monitor activities within web browsers. During a presentation at Security Field Day 14, she discussed how SquareX’s Pro offered an innovative solution to this oversight, ensuring enhanced security monitoring. For additional insights into this topic, follow Marian Newsome’s coverage on LinkedIn Pulse.

The Principle of the Hidden Key

1Password’s approach to agentic AI security emphasizes deterministic authorization, ensuring every action is traceable and secure. Their Security Principles for AI prioritize keeping secrets secret, ensuring auditability, and minimizing exposure. This is implemented through the Model Context Protocol (MCP), which allows AI to interact with systems without accessing credentials, and partnerships like Browserbase for secure autofill. Read more coverage of Security Field Day by Vriti Magee on her blog!

When Networks Learn to Flow

Nile’s Zero Trust architecture simplifies enterprise security by integrating it directly into the network, eliminating the need for complex overlays. Their approach, based on the “Power of Zero,” emphasizes Zero Trust, Zero Touch, and Zero CapEx, ensuring every device is secure by default and operations are autonomous. By focusing on identity-based security and removing unnecessary human dependency, Nile aims to make network security as seamless as possible. Read more Security Field Day coverage on Vriti Magee’s blog!

Inside the Tab

Vriti Magee follows SquareX’s Security Field Day presentation on Browser Detection and Response. They focused on understanding browser-based attacks by observing user interactions within the browser. Their architecture, consisting of a browser extension and a web policy platform, enables real-time threat prevention by enforcing policies at the browser runtime. This shift from control to understanding emphasizes the importance of context-based visibility in cybersecurity.

My First Cartel Meeting (and What It Taught Me About DNS)

Vriti Magee shares a fascinating narrative of an unconventional encounter that illuminated the complexities of DNS, showing its pivotal role in online security and network operations. Through this personal experience, Vriti highlights the significance of understanding DNS not just as a technical component, but as a crucial part of broader cybersecurity strategies. For more insights following Security Field Day, subscribe to Vriti’s blog!

68 Days Ahead: Turning DNS Data into Compliance and Cyber Resilience

Marian Newsome explores how utilizing DNS data can enhance compliance and cyber resilience, providing organizations with a strategic advantage in preempting security threats. Through efficient data analysis, businesses are not only able to meet regulatory requirements but also fortify their defenses against potential cyberattacks. Discover more insights on this topic by Marian Newsome on LinkedIn Pulse.

Passkeys are the Future

Passwords create friction and therefore users find ways around them. New technology such as secure enclaves and PKI allow us to create better solutions like passkeys. In this episode of the Tech Field Day Podcast. Alan Shimel and Kate Scarcella join Tom Hollingsworth to discuss the problems with traditional passwords and how passkeys overcome them. They also talk about why it has taken so long to adopt passkeys and what barriers remain to full implementation. The wrap up with a look at what might lay ahead on the horizon for the future of user security.

The Latest in Cybersecurity Innovation at Security Field Day 14

The world should be more secure, and Tech Field Day is helping make it that way with the latest edition of Security Field Day. The event features two full days of presentations from leading security companies, innovative startups, and expert delegates, all focused on keeping people and software safe in an ever-evolving threat landscape. Tune […]