Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SquareX founder Vivek Ramachandran talks browser security:'The browser has to get more intelligent.'

According to security researcher, book author, and serial entrepreneur Vivek Ramachandran, we’re at a pivotal moment in cybersecurity. Gone are the days of relying on URL/domain analysis to identify threats. With so many employees spending the majority of their time in Chrome, Edge, Safari, or Firefox , Ramachandran thinks the browser is where security products need to innovate.

The Benefits of Integrating PAM With SIEM Solutions

Integrating Privileged Access Management (PAM) with Security Information and Event Management (SIEM) solutions offers many benefits for organizations, including enhanced threat detection, improved visibility, reduced risk of insider threats, simplified compliance and more. Continue reading to learn more about the benefits of integrating PAM with SIEM solutions and best practices for integrating the two.

Best Practices For Responding to Privileged Access Requests

Organizations are prioritizing a Privileged Access Management (PAM) strategy to prevent cybercriminals from accessing privileged accounts and conducting malicious activities. A key component of this strategy is securely managing privileged access requests and ensuring that access is granted only when necessary, properly authenticated and monitored in real time.

Aligning With the Latest Cybersecurity Executive Order

On January 16, 2025, an Executive Order 14144 was issued, aimed at strengthening the nation’s cybersecurity defenses. This order comes at a crucial time – during the fiscal year 2023, U.S. federal agencies reported over 32,000 cybersecurity incidents, reflecting a 5% increase from the previous year.

Random but Memorable - Episode 14.2: Microphone Sharing Browser Fans with Vivek Ramachandran

What’s GhostGPT? This episode, we unpacked the new cybercrime AI being used by hackers. We also serve-up our best tips for secure tax-filing to help you survive tax-season in. If that wasn’t enough, we also invite Founder of SquareX, Vivek Ramachandran, to teach us how we can easily find and eliminate browser security risks. Hit play to find out how the browser landscape has changed in recent years, and how SquareX can help detect and mitigate new and traditional web attacks.

Top Cyber Threats Facing Manufacturing and How To Mitigate Them

The top cyber threats facing the manufacturing industry are ransomware, supply chain attacks, insider threats, phishing and social engineering attacks. In 2023, the manufacturing sector accounted for 25% of all cyber attacks, making it the most targeted industry. As the manufacturing industry increasingly relies on the Internet of Things (IoT) to improve efficiency and productivity, addressing security risks has become essential.