SquareX at Security Field Day 14. Showcasing how SquareX Closes the SWG…

At Security Field Day 14, SquareX demonstrated its innovative approach to closing security gaps in Secure Web Gateways (SWG). Their presentation highlighted the pivotal enhancements and the robust architecture of their solution that defends against evolving cyber threats. For comprehensive coverage of SquareX’s presentation, watch our Tech Field Day social media channels!

DNS Must Be Secured Presented by Infoblox

DNS security is no longer optional. This service is not only being attacked by nefarious actors but it is also being leveraged in ways to compromise users and exfiltrate data. In this episode of the Tech Field Day podcast, brought to you by Infoblox, Tom Hollingsworth is joined by Jack Poller and Cricket Liu. They talk about the historical openness of DNS and how that has led to it becoming easy to see what users are doing and create ways to manipulate them. They discuss ways to secure the protocol and how companies like Infoblox are extending the capabilities for future security.

Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management

Jack Poller recently discussed 1Password’s expansion beyond its core password management capabilities, highlighting its strategic shift towards Extended Access Management. This evolution aims to provide more comprehensive security solutions that address various access control needs in an increasingly complex digital environment. For further coverage of Security Field Day 14, follow Jack Poller’s coverage on Security Boulevard.

Why DNS Is Still the Weakest Link in Modern Security — and How Infoblox Changes The Scene

DNS vulnerabilities remain a critical issue in cybersecurity, often serving as an initial attack vector for various threats. Infoblox is addressing these challenges by enhancing DNS security protocols and offering solutions that integrate seamlessly with existing enterprise systems, thereby improving resilience against attacks. Find more coverage of Security Field Day 14 by Kate Scarcella on LinkedIn!

Bridging the Trust Gap with 1Password

Tom Hollingsworth recently explored how 1Password can help bridge the trust gap in today’s security environment by providing robust password management solutions that enhance data protection and user trust. His insights point towards the increasing relevance of secure password vaults in maintaining privacy and integrity in digital transactions. For more coverage of Security Field Day 14, visit Security Boulevard.

Your Enterprise LAN Security Is a Problem—Nile Can Fix It

Tom Hollingsworth examines the significant challenges facing enterprise LAN security, highlighting how vulnerable traditional network infrastructures can be to sophisticated cyber threats. He introduces Nile, a new security solution that promises to address and mitigate these vulnerabilities effectively. For additional insights into Nile’s impact on enterprise security, visit Tom Hollingsworth’s coverage on Security Boulevard.

How HPE’s New Security Playbook Is Actually Stopping Threats

In this article following Security Field Day 14, Tom Hollingsworth examines Hewlett Packard Enterprise’s innovative approach to cybersecurity, detailing how their new security strategies are effectively mitigating threats. He highlights the integration of advanced tools and protocols that are setting new standards in the industry for protecting enterprise data assets. For additional insights into this topic, check out the coverage on Security Boulevard.

When “It’s Always DNS” Becomes Your Security Advantage

In his latest analysis, Jack Poller examines how the common adage “It’s Always DNS” can be turned into a strategic advantage for cybersecurity efforts. He discusses how DNS, typically a source of network issues, can also serve as a critical tool in identifying and mitigating security threats. For further insights about Security Field Day 14 and Infoblox, watch Security Boulevard!

The Metamorphosis of Trust

Kate Scarcella writes about 1Password’s presentation at Security Field Day 14 in this LinkedIn Pulse article. Their password management exemplifies the evolution of encryption, bridging the gap between enterprise and consumer trust models with its dual-key model and zero-knowledge architecture.

Enhancing Security in the Age of AI and Agents

The Techstrong Gang explores the increasing complexities of enterprise security in an era dominated by advanced artificial intelligence and automated agents. They discuss the need for evolving security strategies to safeguard data and infrastructure against sophisticated threats enabled by these technologies. During the conversation, Stephen Foskett compares the approach of NetApp as seen at the recent INSIGHT event, for data protection. The topics presented at Security Field Day are also covered, including SquareX, as well as the recent Microsoft Security event.

The Endpoint Has Moved to the Browser — Your Security Tools Haven’t

Jack Poller discusses the shift of endpoint computing to the browser in a recent article, highlighting how traditional security tools are lagging behind in adapting to this change. He explains that as applications and user data migrate from desktops to web platforms, the paradigm for security must evolve to address new vulnerabilities and threats. This was the topic of the SquareX presentation at Security Field Day. For more coverage on this topic, follow Jack Poller on LinkedIn.

Your EDR Can’t See Inside Browsers — What SquareX Proved at Security Field Day 14

Marian Newsome recently highlighted a critical gap in cybersecurity: most Endpoint Detection and Response (EDR) systems fail to monitor activities within web browsers. During a presentation at Security Field Day 14, she discussed how SquareX’s Pro offered an innovative solution to this oversight, ensuring enhanced security monitoring. For additional insights into this topic, follow Marian Newsome’s coverage on LinkedIn Pulse.

The Principle of the Hidden Key

1Password’s approach to agentic AI security emphasizes deterministic authorization, ensuring every action is traceable and secure. Their Security Principles for AI prioritize keeping secrets secret, ensuring auditability, and minimizing exposure. This is implemented through the Model Context Protocol (MCP), which allows AI to interact with systems without accessing credentials, and partnerships like Browserbase for secure autofill. Read more coverage of Security Field Day by Vriti Magee on her blog!

When Networks Learn to Flow

Nile’s Zero Trust architecture simplifies enterprise security by integrating it directly into the network, eliminating the need for complex overlays. Their approach, based on the “Power of Zero,” emphasizes Zero Trust, Zero Touch, and Zero CapEx, ensuring every device is secure by default and operations are autonomous. By focusing on identity-based security and removing unnecessary human dependency, Nile aims to make network security as seamless as possible. Read more Security Field Day coverage on Vriti Magee’s blog!

Inside the Tab

Vriti Magee follows SquareX’s Security Field Day presentation on Browser Detection and Response. They focused on understanding browser-based attacks by observing user interactions within the browser. Their architecture, consisting of a browser extension and a web policy platform, enables real-time threat prevention by enforcing policies at the browser runtime. This shift from control to understanding emphasizes the importance of context-based visibility in cybersecurity.

My First Cartel Meeting (and What It Taught Me About DNS)

Vriti Magee shares a fascinating narrative of an unconventional encounter that illuminated the complexities of DNS, showing its pivotal role in online security and network operations. Through this personal experience, Vriti highlights the significance of understanding DNS not just as a technical component, but as a crucial part of broader cybersecurity strategies. For more insights following Security Field Day, subscribe to Vriti’s blog!

68 Days Ahead: Turning DNS Data into Compliance and Cyber Resilience

Marian Newsome explores how utilizing DNS data can enhance compliance and cyber resilience, providing organizations with a strategic advantage in preempting security threats. Through efficient data analysis, businesses are not only able to meet regulatory requirements but also fortify their defenses against potential cyberattacks. Discover more insights on this topic by Marian Newsome on LinkedIn Pulse.

Passkeys are the Future

Passwords create friction and therefore users find ways around them. New technology such as secure enclaves and PKI allow us to create better solutions like passkeys. In this episode of the Tech Field Day Podcast. Alan Shimel and Kate Scarcella join Tom Hollingsworth to discuss the problems with traditional passwords and how passkeys overcome them. They also talk about why it has taken so long to adopt passkeys and what barriers remain to full implementation. The wrap up with a look at what might lay ahead on the horizon for the future of user security.

The Latest in Cybersecurity Innovation at Security Field Day 14

The world should be more secure, and Tech Field Day is helping make it that way with the latest edition of Security Field Day. The event features two full days of presentations from leading security companies, innovative startups, and expert delegates, all focused on keeping people and software safe in an ever-evolving threat landscape. Tune […]