zero trust

AppGuard & Carahsoft Tap Leading Cybersecurity Experts to Discuss Hardware Hacks

AppGuard & Carahsoft Tap Leading Cybersecurity Experts to Discuss Hardware Hacks

Panelists worthy of any CISO’s attention, discussed and prioritized the methods China is using to compromise enterprises via their supply chain, including the currently rare, covert placement of spy chips into computing hardware. China’s ‘2025’ strategy to steal and degrade western economic power affects any enterprise that generates high-margin value and/or is in the same supply chain with those that do. The world has not seen such intense and pervasive nation-state aggression since the Cold War.

China Hack - Upcoming Expert Virtual Panel Discussion

China Hack - Upcoming Expert Virtual Panel Discussion

Reports of covertly adding chips to motherboards for industrial espionage require CISO’s to ask their peers and teams ‘what are the Chinese actually doing to steal data from organizations like ours’ and ‘what should we be doing to counter their efforts’? Enterprises targeted by China can get the answers and insights they seek from the panel Carahsoft and AppGuard have assembled. Hosted by Mike Lyons of CBS News, it features experts from the intelligence community, cybersecurity policy, and cybersecurity technology.

5 Critical Areas All CISOs Should Focus on at Year End

5 Critical Areas All CISOs Should Focus on at Year End

AppGuard is facilitating a virtual panel discussion of CISOs on October 3rd to help them help each other better prepare for 2019. Attendees can expect to gain useful insights from peers and join the conversation. Five topics loosely tied to mitigating malware threats will be explored. 

Authentication: Don't Forget Endpoint Protection

Authentication: Don't Forget Endpoint Protection

Google recently stated that none of its 80,000 employee accounts using their Titan Security Key has been compromised since deployment. This is because this hardware authentication device is a possession factor that cyber criminals cannot electronically steal as they do passwords. But, as great as this and like tools are, they are susceptible when the endpoints using them are compromised. Read on to learn more about how your different authentication mechanisms depend on endpoint protection as well as the one capability you need for this but may have never heard about.