Secure Web Gateways Have Failed Us - Vivek Ramachandran - BH24 #1

Описание к видео Secure Web Gateways Have Failed Us - Vivek Ramachandran - BH24 #1

With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions.

This segment will demonstrate the importance of a browser-native solution, discuss the limitations of current solutions and how enterprises can better protect their employees from web attacks.

Segment Resources:
DEF CON talk abstract: https://defcon.org/html/defcon-32/dc-...

Enterprise use cases for SquareX: https://www.sqrx.com/enterprise

Data Sheet: https://drive.google.com/file/d/1tv3q...

Why Browser Native Solutions are better than Cloud Based Proxies: https://drive.google.com/file/d/1cItX...

Blog on the Many Failures of Secure Web Gateways: https://labs.sqrx.com/the-unspoken-ch...

This segment is sponsored by Square X. Visit https://securityweekly.com/squarexbh to learn how SquareX can protect your employees from web attacks!

Show Notes: https://securityweekly.com/bh24-1

0:00 - Welcome and Introduction
0:40 - Vivek Ramesh Chandran's Background in Cybersecurity
0:45 - Journey into Cybersecurity and Founding Square X
1:29 - Transition from Pen Testing to Square X
1:45 - The Need for Browser-Based Security
2:52 - Evolution of Security Architecture and Browser Protection
3:48 - Modern Cloud-Based Security Challenges
4:05 - The Rise of Browser-Based Attacks
5:20 - Comparing WAFs and Square X's Approach
5:51 - Differences Between WAFs and Square X's Security Solution
6:52 - Example of Browser-Based Attacks and Their Impacts
7:54 - Challenges with Remote Work and Browser Security
8:06 - Square X's Approach to Browser Security
8:34 - Integrating Security into Existing Browsers
9:37 - Upcoming DEF CON Talk Preview
9:45 - Discussion on Secure Web Gateways and Their Limitations
10:47 - Architectural Improvements for Browser Security
11:01 - Targeting Techniques and Social Engineering
13:23 - How Attackers Exploit Browser Vulnerabilities
14:35 - The Challenge of Malicious Macros and Endpoint Security
15:49 - Best Practices for Browser Security
16:00 - DEF CON Talk Details and Closing Remarks

Комментарии

Информация по комментариям в разработке