Sheltering From the Cyberattack Storm – Part Two
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But…
In the first part of this series, I discussed sophisticated cyberattacks, analyzed an example, and offered advice on how to remediate against such an attack. But…
Navigating the complex web of compliance in the AI era is a formidable challenge, and aligning your organization with existing and emerging legal, ethical, and…
As the world of software development accelerates, the need to secure applications from the earliest stages of development has become critical. The rise of DevSecOps…
Forget Game of Thrones and House of The Dragon; the real battle for power is between cyber criminals and security teams. After all, a well-planned…
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much of it remains scattered, siloed,…
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log in. CrowdStrike’s 2023 Global Threat…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and IT/enterprise cybersecurity teams alike. This…
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a host of expanding security challenges:…
Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more than 70% of organizations only…
Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. In a…
In a rapidly evolving cybersecurity landscape, identity-based threats are at an all-time high. The 2024 Trends in Identity Security Report reveals that 84% of identity…
As organizations increasingly rely on edge devices for data collection and processing, the risk of sensitive data breaches has escalated. The proliferation of traditional and…