Security teams rely on an ever-growing stack of cybersecurity tools to keep their organization safe.

Related: The worst year ever for breaches

Yet there remains a glaring disconnect between security systems and employees.

Now comes a start-up, Amplifier Security, with a bold new approach to orchestrate security actions.

Just after RSAC 2024, I spoke with Thomas Donnelly, Amplifier’s co-founder and CTO, about how that they’re utilizing large language models (LLMs) and to emphasize continual employee engagements. For a full drill down, on how Amplifier aims to help companies shape a security culture — without sacrificing productivity — please give the accompanying podcast a listen.

At the heart of Amplifier’s solution is Ampy, an AI security buddy. Ampy interacts directly with each employee to facilitate automated security fixes. Ultimately Ampy offloads a ton of manual work that security teams typically have to do by chasing employees themselves.

Donnelly explained how Amplifier leverages LLM to make Ampy friendly and increasingly knowledgeable. For instance, Ampy helped one early customer achieve a 70 percent improvement in security training compliance in just a couple of weeks and other customers report material improvement in the time and effort required to manage vulnerabilities.

By making security very engaging and directly involving employees in security processes, CISOs can foster cross-functional teamwork with other departments, Donnelly argues. The clincher is that this can help them get firmer footing to secure employees and their assets, using existing tools, and thereby nurture a security culture, he says.

Makes a lot of sense. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC Fireside Chat: Amplifier Security taps LLMs to help organizations foster a security culture first appeared on The Last Watchdog.

The coalescing of the next-gen security platforms that will carry us forward continues.

Related: Jump starting vulnerability management

Adaptiva, a leader in autonomous endpoint management, recently announced the launch of OneSite Patch for CrowdStrike. This new solution integrates with CrowdStrike’s Falcon XDR platform to improve the efficiency and speed of patching critical vulnerabilities in enterprise systems.

This strategic alliance between Adaptiva and CrowdStrike makes a lot of sense. OneSite Patch leverages CrowdStrike’s rich threat intelligence and vulnerability data to prioritize and automate patch deployments.

Thus it provides a smooth path for companies to patch vulnerabilities and install updates much more efficiently. This pain point is intensifying at large and mid-sized enterprises as operations become more globally distributed and interconnected at the cloud edge.

The State of Patch Management in the Digital Workplace Report, for instance, underscores how legacy vulnerability management practices are by and large bereft of any meaningful strategic intent; for instance, some 79% of respondents said patch deployments are scheduled ad hoc or use a one-size fits all approach.

Last Watchdog engaged Davinder Singh, Chief Technology Officer at Adaptiva, to drill down on the current state of securing networks. Here’s that exchange, edited for clarity and length.

LW: What’s the core value proposition of this alliance with CrowdStrike?

Singh: The core value is in the rapid and autonomous patching of critical vulnerabilities — by leveraging CrowdStrike’s rich vulnerability data. The integration of Adaptiva’s OneSite Patch with CrowdStrike Exposure Management allows for automated, risk-based prioritization of patches, significantly reducing the time required to address vulnerabilities. This collaboration bridges the gap between security and IT teams, ultimately improving organizations’ cybersecurity posture and compliance.

LW: What’s an example that illustrates the benefit of teaming?

Singh

Singh: It’s now possible to automatically patch critical vulnerabilities across Windows and over 1,500 third-party applications as soon as patches are available. By utilizing CrowdStrike’s rich vulnerability insights, Adaptiva’s OneSite Patch can determine patch priorities and schedule deployments to ensure that critical vulnerabilities are patched immediately. This automated, data-driven approach eliminates delays caused by manual processes and improves coordination between security and IT teams, ultimately reducing the risk of cyberattacks and improving compliance with security regulations.

LW: Can you provide an anecdote from the field that shows an enterprise benefiting from combining CrowdStrike’s rich intel with Adaptiva’s streamlined approach to patch management?

Singh: One example is a large tire manufacturer that operates multiple production plants globally, each with its own production schedule. Patches can only be applied outside of production times. But the IT team lacked control over production schedules, requiring approval from plant management for any patching activities.

Adaptiva’s OneSite Patch integrates plant managers into the approval process, automatically notifying them when a patch update is available. Plant managers then review and approve patches, with the ability to identify which patches are critical. This ensures that patches are applied efficiently without disrupting production schedules.

All stakeholders have complete visibility. Security teams can monitor compliance, while IT teams can ensure that patches are deployed in a timely manner without interfering with production. Combining CrowdStrike’s threat intelligence and Adaptiva’s patch management streamlined the manufacturer’s vulnerability management process, enhancing their overall cybersecurity posture while maintaining production efficiency.

LW: Can you correlate vulnerability management (VM) best practices to the rising threat of GenAI-enhanced attacks? How does robust VM help meet this new exposure?

Singh: GenAI can be used by attackers to continuously scan for weaknesses and launch real-time attacks. This constant threat environment requires organizations to be equally vigilant. Continuous monitoring of systems and real-time integration of threat intelligence can help detect anomalies and new threats as they emerge.

Coupled with an efficient patch management process, organizations can significantly reduce the window of exposure. Given that nearly 60% of companies take two weeks or more to initiate patch deployment, improving this process is critical to staying ahead of potential breaches.

Automated remediation tools can drastically reduce the time from detection to mitigation, applying patches, isolating affected systems, and initiating other defensive measures without human intervention.

LW: What does this partnership signal about emergent security frameworks and platforms?

Singh: By combining Adaptiva’s autonomous patching capabilities with CrowdStrike’s AI-driven vulnerability data it becomes possible to support a wide range of applications and systems in a diverse and complex environment.

In the years to come, security frameworks and platforms will increasingly rely on automation, AI, and integrated approaches to enhance protection, streamline operations, and adapt to the evolving threat landscape.

The alliance between Adaptiva and CrowdStrike signals how IT and security platforms must seamlessly collaborate. Unifying workflows improves efficiency and reduces silos within organizations.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

The post New Tech Q&A: Adaptiva – CrowdStrike alliance highlights trend of blending IT and security systems first appeared on The Last Watchdog.

Uncategorized

Secure Access Service Edge (SASE) has come a long way since Gartner christened this cloud-centric cybersecurity framework in 2019.

Related: Can SASE stop tech sprawl?

SASE blends networking architecture, namely SD-WAN, with cloud-delivered security services such as security web gateways, Zero Trust network access and more.

Several distinct variants of SASE have come to be supplied by diverse sources. This includes new players, like Versa Networks and Cato Networks; security stalwarts, like Palo Alto Networks and Zscaler; and even tech giants, like Cisco and Akamai.

Just after RSAC 2024, I had the chance to visit with Ken Rutsky, CMO at Aryaka, which is supplying yet another flavor: Unified SASE as a Service.” For a full drill down, please give the accompanying podcast a listen

We discussed how the SASE market has shifted post Covid 19. Early SASE solutions often stitched together disparate networking and security products resulting in operational inefficiencies, Rutsky told me.

Aryaka unifies networking and security architectures at a foundational level. “In a lot of scenarios, organizations are forced into this untenable trade-off between performance and security, and we know who usually wins,” he says. “We think unified SASE is the way to break that trade-off between performance and security.”

Acknowledging that organizations must rationalize past security investments, even ones that no longer quite fit, Aryaka does not ask customers to rip and replace anything.  Instead, it meets them where they are, he says, then guides them through adoption in stages.

This is a prime example of the wider trend of cybersecurity solutions becoming more integrated to meet complex pressures. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC 2024: The many flavors of ‘SASE’ now includes Aryaka’s ‘Unified SASE as a Service.” first appeared on The Last Watchdog.

Secure Access Service Edge (SASE) has come a long way since Gartner christened this cloud-centric cybersecurity framework in 2019.

Related: Can SASE stop tech sprawl?

SASE blends networking architecture, namely SD-WAN, with cloud-delivered security services such as security web gateways, Zero Trust network access and more.

Several distinct variants of SASE have come to be supplied by diverse sources. This includes new players, like Versa Networks and Cato Networks; security stalwarts, like Palo Alto Networks and Zscaler; and even tech giants, like Cisco and Akamai.

Just after RSAC 2024, I had the chance to visit with Ken Rutsky, CMO at Aryaka, which is supplying yet another flavor: Unified SASE as a Service.” For a full drill down, please give the accompanying podcast a listen

We discussed how the SASE market has shifted post Covid 19. Early SASE solutions often stitched together disparate networking and security products resulting in operational inefficiencies, Rutsky told me.

Aryaka unifies networking and security architectures at a foundational level. “In a lot of scenarios, organizations are forced into this untenable trade-off between performance and security, and we know who usually wins,” he says. “We think unified SASE is the way to break that trade-off between performance and security.”

Acknowledging that organizations must rationalize past security investments, even ones that no longer quite fit, Aryaka does not ask customers to rip and replace anything.  Instead, it meets them where they are, he says, then guides them through adoption in stages.

This is a prime example of the wider trend of cybersecurity solutions becoming more integrated to meet complex pressures. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC 2024: The many flavors of ‘SASE’ now includes Aryaka’s ‘Unified SASE as a Service.” first appeared on The Last Watchdog.

CISOs have been on something of a wild roller coaster ride the past few years.

Related: Why breaches persist

When Covid 19 hit in early 2020, the need to secure company networks in a new way led to panic spending on cybersecurity tools. Given carte blanche, many CISOs purchased a hodge podge of unproven point solutions, adding to complexity.

By mid-2022, with interest rates climbing and the stock market cratering, CFOs began demanding proof of a reasonable return on investment. Today, with purse strings tightened – and cyber risks and compliance pressures mounting — CISOs must recalibrate.

I had a fascinating discussion about this with Ryan Benevides, a principal at WestCap, the growth equity firm founded by Laurence Tosi, former CFO of Blackstone and Airbnb. WestCap’s cybersecurity partnerships  includes HUMAN Security, Bishop Fox and Dragos.

Benevides shared his perspective of how the cybersecurity realm has become saturated with over 4,000 venture-backed vendors who are under tighter scrutiny as well. For a full drill down, please give the accompanying podcast a listen.

Despite this turbulence, WestCap views this reset as a positive development. Both CISOs looking for better tools — and the innovators supplying them — must now focus on filling gaps and meeting genuine market needs, Benevides observes. And this can be done by leveraging advanced technologies, namely automation and AI, he says.

He highlighted the need for tools that improve communication between CISOs and board members and noted that positioning cybersecurity as a business enabler will be a key to success.

Agreed. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

 

The post RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments first appeared on The Last Watchdog.

The tectonic shift of network security is gaining momentum, yet this transformation continues to lag far behind the accelerating pace of change in the operating environment.

Related: The advance of LLMs

For at least the past decade, the cybersecurity industry has been bending away from rules-based defenses designed to defend on-premises data centers and leaning more into tightly integrated and highly adaptable cyber defenses directed at the cloud edge.

I first tapped Gunter Ollmann’s insights about botnets and evolving malware some 20 years when he was a VP Research at Damballa and I was covering Microsoft for USA TODAY. Today, Ollmann is the CTO of IOActive, a Seattle-based cybersecurity firm specializing in full-stack vulnerability assessments, penetration testing and security consulting. We recently reconnected. Here’s what we discussed, edited for clarity and length?

LW: In what ways are rules-driven cybersecurity solutions being supplanted by context-based solutions?

Ollmann: I wouldn’t describe rules-based solutions as being supplanted by context-based systems. It’s the dimensionality of the rules and the number of parameters consumed by the rules that have expanded to such an extent that a broad enough contextual understanding is achieved. Perhaps the biggest change lies in the way the rules are generated and maintained, where once a pool of highly skilled and experienced cybersecurity analysts iterated and codified actions as lovingly-maintained rules, today big data systems power machine learning systems to train complex classifiers and models. These complex models now adapt to the environments they’re deployed in without requiring a pool of analyst talent to tweak and tune.

LW: In what noteworthy ways have legacy technologies evolved?

Ollmann: Cybersecurity technologies are continuously evolving; they must because both the threat and the business requirements are continuously changing. It’s been that way since the first person suggested using a password along with a login ID.

That said, to date the two biggest changes and influences upon legacy technologies have been public cloud and AI. Public cloud not only shifted the perimeter of internet business, but it also enabled a shift to SaaS delivery models – forcing traditional legacy protection technologies to transform. This fundamentally changed the way organizations shared and consumed cyber protection and detection information. It took quite some effort to shift from every on-premise log action and rule being private and confidential, to trusting cloud solution providers with that same data, pooled across multiple customers, and reaping the benefits of collective intelligence.

That cloud transformation and pooling of threat and response data was fundamental to the second transformation: deploying and applying AI-based cybersecurity technologies that range from training and reinforcement learning of detection models to incident response playbook production and auto-response. While the core “legacy” security building blocks have remained the same, the firewalls have grown smarter, the SIEMs detect and classify kill chains faster and blocking responses have become more trusted.

LW: Which legacy solutions are threatened with extinction?

Ollmann

Ollmann: Solutions that focus on enterprise-level on-premises and air-gapped protection are on borrowed time. Some people will argue that there will always be a need for such solutions, but their efficacy against today’s threats is constantly diminishing. There’s a real reason why on-premises anti-spam gateways protecting on-premises mail services are failing, and part of that is because some classes of threats are exponentially easier to detect and mitigate through massive cloud scale and collective intelligence.

Additionally, the majority of today’s solutions that require a customer’s pool of in-house analysts and security experts to update and maintain a custom-tuned or unique set of detection rules, data connectors, response playbooks, blocking filters, etc., are also on borrowed time. The last generation of machine learning system automation and the first generation of LLM-based analyst augmentation have proven they can replace the tier-one and tier-two human analysts traditionally tasked with building and maintaining those customized rules. There’s a sizable ecosystem of tooling and providers that specialize in custom rule creation and maintenance. They’re equally in trouble if they don’t adapt and evolve.

LW: What does the integration of iterated legacy tools into edge-focused newer technologies look like?

Ollmann: To understand the next generation of security technologies and what that means for the iterated evolution of legacy tools, it’s important to step back. Too often, as security professionals, we’re day-to-day involved in watching our feet on the dance floor and keeping in time with the music. When we take a step back, we get to see the bigger movements and relationships between dances.

We have an ecosystem of niche tools and specialized solutions for elements and processes within a chained pipeline of protection and response. Enterprise buyers select and integrate these components to achieve the same lofty goals as everyone else. For the last decade, we’ve seen a significant uptick in the growth of managed security service providers that effectively offer an obscured, off-the-shelf integrated protection and/or response pipeline that focuses on delivering the buyer’s security objectives rather than the stack of technologies’ security.

In parallel, over the last half-decade, we’ve observed the rapid development and advancement of cross-cloud and hybrid-cloud security posture management and response solution providers. Vendors such as Wiz, Palo Alto Network and CrowdStrike have acquired or rebuilt from the ground up much of the legacy tooling and capabilities and brought them together as unified edge protection and security management platforms. Behind the scenes, they’ve invested hugely in intelligent automation and AI systems to overcome and do away with the stack of interdependent legacy technologies (from a customer’s perspective).

LW: Looking just ahead, which new security platforms or architectures do you expect to emerge as cornerstones?

I think the managed security services industry that’s been leveraging inexpensive human analysts will lose to the new cloud and edge security posture management and response solution providers unless they transform and completely embrace AI. They’re at a disadvantage because they’re not software developers. They’re not AI engineers. But they are sitting on a lot of very valuable customer data and already have the integrations and relationships to drive transformational impact to their customers.

Collective intelligence and the knowledge derived from streaming vast data is a cornerstone to protection, compliance, and threat response. AI, LLMs, machine learning models, and their future iterations’ efficacy is dependent upon this data. It’s true, data is the new gold rush.

The cornerstone around the corner (as it were) that will likely bring the next business transformation will be ubiquitous confidential cloud computing. The legacy on-premises and air-gapped business requirements disappear once confidential compute is economical, prevalent, and performant. At that point, the “edge” consolidates to the cloud-edge, and new protections over data and regulatory concerns are overcome.

LW: Where is this all taking us over the next two to five years?

The global shortage of cybersecurity talent continues to hold back the industry. Just as cybersecurity requirements have become mainstream, the explosion of corporate need for trained security professionals and the chasm of attaining the security experience required to protect and operate the advanced cyber defense technologies, have arguably made businesses feel less secure.

The rapid advances in applied AI to security and the growth of AI-first security companies gives us great hope in overcoming the skills gap situation.

Over the next few years, I think AI-based automation of response and augmentation of human analysts will largely overcome the bottleneck of the historic cybersecurity talent shortage.

While some experts presume that AI will help elevate a new generation of cybersecurity graduates to quickly become tier-three expertise proficient, I don’t think that’s where the primary changes and benefits will come. Just as generative AI has enabled almost anyone to near instantly create their own Shakespearean-esque sonnets or Picasso-ify their dream illustrations, I expect security AI advancements to apply to, and be adopted by, other non-cyber professionals already within the business.

It’s exponentially easier and more beneficial to elevate someone with multiple years of institutional experience and business process knowledge and augment them with advanced security capabilities than to take a cybersecurity graduate and teach them the ins and outs of the business and personalities in play.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


The post NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out first appeared on The Last Watchdog.

Confidence in the privacy and security of hyper-connected digital services is an obvious must have.

Related: NIST’s  quantum-resistant crypto

Yet, Digital Trust today is not anywhere near the level it needs to be. At RSAC 2024 I had a wide-ranging conversation with DigiCert CEO Amit Sinha all about why Digital Trust has proven to be so elusive. For a full drill down, please give the accompanying podcast a listen.

We spoke about how the Public Key Infrastructure (PKI) has come under pressure. PKI and digital certificates provide the essential framework for authenticating identities, encrypting communications and ensuring data integrity.

However, with the shift to remote work and the proliferation of Internet of Things systems, the complexity of maintaining a fundamental level of trust in digital services has risen exponentially.

And that curve will only steepen as GenAI/LLM services ramp up and quantum computers get mainstreamed, Sinha observed.

Sinha highlighted the importance of automation and comprehensive control in managing digital certificate sprawl. With respect to AI innovation, Sinha noted a couple of near -term concerns: distinguishing real from fake content and ensuring the integrity of the software supply chain. With so many more connections being made, extending and scaling the PKI framework to help mitigate these new exposures makes sense and can be done, he argues.

At same time, companies need to stay in step with efforts National Institute of Standards and Technology (NIST) to implement quantum-resistant algorithms. DigiCert supports this push and is hosting the first World Quantum Readiness Day on September 26.

Digital Trust absolutely needs to be on the front burner. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC Fireside Chat: Here’s what it will take to achieve Digital Trust in our hyper-connected future first appeared on The Last Watchdog.

Taking stock of exposures arising from the data-handling practices of third-party suppliers was never simple.

Related: Europe requires corporate sustainability

In a hyper-connected, widely-distributed operating environment the challenge has become daunting.

At RSAC 2024, I visited with Paul Valente, co-founder and CEO of VISO TRUST. We had a wide-ranging discussion about the limitations of traditional third-party risk management (TPRM), which uses extensive questionnaires—and the honor system – to judge the security posture of third-party suppliers. For a full drill down, please give the accompanying podcast a listen.

VISO TRUST launched in 2020 to introduce a patented approach, called Artifact Intelligence, to automate the assessment of third-party risks. This method employs natural language processing (NLP) and various machine learning models, including large language model (LLM) to automate the assessment of third-party risks, Valente told me.

The benefits of advanced TPRM technologies extend beyond implementing these audits much more efficiently and effectively at scale. Valente cited how a customer, Illumio, is  leveraging Artifact Intelligence to conduct vendor assessments very early in the procurement process, significantly enhancing decision-making and avoiding high-risk relationships.

The evolving regulatory landscape is a significant driver for the adoption of advanced TPRM solutions. From the stringent interagency guidelines and state laws in New York to healthcare regulations and European legal frameworks, companies face mounting pressures to enhance their third-party cyber risk management practices, Valente noted.

With “companies approaching 100 percent third-party integration,” CISOs are making TPRM a top priority, he says. “It’s just an enormous challenge. And to solve it from a CISO standpoint means solving the scalability issue and solving the data quality issue.”

The shoring up of supply chain security continues. I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC Fireside Chat: VISO TRUST replaces questionaires with AI analysis to advance ‘TPRM’ first appeared on The Last Watchdog.

Companies that need to protect assets spread across hybrid cloud infrastructure face a huge challenge trying to mix and match disparate security tools.

Related: Cyber help for hire

Why not seek help from a specialist? At RSAC 2024, I visited with Geoff Haydon, CEO, and Alex Berger, Head of Product Marketing, at Ontinue, a new player in the nascent Managed Extended Detection and Response (MXDR) space.

MXDR extends from the long-established Managed Security Service Providers (MSSP) space. MSSPs came along 20 years ago to assist with on-premises tools like firewalls, intrusion detection and antivirus tools.

Managed Detection and Response (MDR) arose to focus on advanced threat detection and remediation. And next came MXDR solutions, which offer wider, more integrated coverage while emphasizing automation and collaboration.

Haydon and Berger, for instance, explained how Ontinue leverages machine learning to automate detection and low-level incident management. For a full drill down please give the accompanying podcast a listen.

Berger told me how Ontinue has begun leveraging Large Language Model (LLM) tool to automate incident summarization. LLM is perfectly suited to this task. Human analysts no longer must carve out time to write coherent summaries – and no longer even need to be fluent in English.

Ontinue has also tightly integrated their services with Microsoft Teams – to promote close collaboration with clients. “Security is a team sport,” Haydon says. “This allows us to become an integral part of our customers’ IT and security teams.”

How far will MXDR take organizations as they navigate unprecedented risks? I’ll keep watch and keep reporting.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC Fireside Chat: Ontinue ups the ‘MXDR’ ante — by emphasizing wider automation, collaboration first appeared on The Last Watchdog.

Could we be on the verge of Privacy Destruction 2.0, thanks to GenAI?

Related: Next-level browser security

That’s a question that spilled out of a thought-provoking conversation I had with Pedro Fortuna, co-founder and CTO of Jscrambler, at RSAC 2024.

Jscrambler provides granular visibility and monitoring of JavaScript coding thus enabling companies to set and enforce security rules and privacy policies. For instance, it helps online tax services prevent leakage of taxpayers’ personal information via pixels, those imperceptible JavaScripts embedded in a web page to collect information about the user’s interactions.

It turns out, Fortuna observed, that GenAI/LLM is perfectly suited to the deeper mining of personal data collected by pixels as well as other JavaScript mechanisms currently in wide use.

This brought to mind 2010, the year I wrote news stories for USA TODAY about Mark Zuckerberg declaring privacy was “no longer a social norm” and Google CEO Eric Schmidt admitting that Google’s privacy policy was to “get right up to the creepy line and not cross it.”

Today, the temptation for companies to leverage GenAI/LLM just to get ahead of the competition is intense; and the stage is set for them to trample what remains of privacy protection in the post Zuckerberg/Schmidt era.

Jscrambler can at least provide technology to monitor and control how third-party JavaScript components handle private data. But at the end of the day, company leaders must be compelled to avail themselves of such tools and make privacy protection a priority.

For his part, Fortuna told me he is concerned that his two young children might become accustomed to relinquishing their privacy to unscrupulous data collectors; but he’s also optimistic that guardrails will emerge. For a full drill down, please give the  a listen.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

The post RSAC Fireside Chat: Jscrambler levels-up JavaScript security, slows GenAI-fueled privacy loss first appeared on The Last Watchdog.