Cyber Security CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study Feb 2, 2024 darkreading.com Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
Cyber Security Shifting Left Means Shifting Smart: Managing Software Risk With ASPM Feb 1, 2024 cyberdefensemagazine.com By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…
Cyber Security Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead Jan 30, 2024 cyberdefensemagazine.com By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…
Cyber Security What the Government Can Learn from the Private Sector in Pursuit of Zero Trust Jan 28, 2024 cyberdefensemagazine.com By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…
Cyber Security It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence Jan 27, 2024 cyberdefensemagazine.com By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…
Cyber Security How to Create a Threat Hunting Program for Your Business Jan 25, 2024 cyberdefensemagazine.com By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…
Cyber Security Expect to Fail: How Organizations Can Benefit from a Breach Jan 24, 2024 cyberdefensemagazine.com By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
Cyber Security Keeping SaaS Data Under Wraps Jan 23, 2024 cyberdefensemagazine.com A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…
Cyber Security Adapting Security to Protect AI/ML Systems Jan 10, 2024 darkreading.com AI/ML libraries create much larger attack surfaces, and traditional IT security lacks several key capabilities for protecting them.
Cyber Security Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024 Dec 26, 2023 darkreading.com Political and economic motivations impel nation-state and independent hackers, while the European Union strives to keep its members secure and…
CISO Corner: Gen Z Challenges, CISO Liability & Cathay Pacific Case Study
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers.
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up…
Ruthless Prioritization Is a Myth: Aim For Risk-Less Prioritization Instead
By Craig Burland, CISO, Inversion6 In a world driven by technology, innovation and rapid change, companies often find themselves touting…
What the Government Can Learn from the Private Sector in Pursuit of Zero Trust
By Kevin Kirkwood, Deputy CISO, LogRhythm It has now been over two years since President Biden issued the Executive Order…
It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…
How to Create a Threat Hunting Program for Your Business
By Zac Amos, Features Editor, ReHack When it comes to online security, danger lurks around every corner. A threat hunter’s…
Expect to Fail: How Organizations Can Benefit from a Breach
By Tyler Farrar, CISO, Exabeam The Chief Information Security Officer (CISO) is one of the most prominent and well-paid positions…
Keeping SaaS Data Under Wraps
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…
Adapting Security to Protect AI/ML Systems
AI/ML libraries create much larger attack surfaces, and traditional IT security lacks several key capabilities for protecting them.
Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024
Political and economic motivations impel nation-state and independent hackers, while the European Union strives to keep its members secure and…