Blog

Header_strip
blog-bg-shape
EP 28: Cybersecurity Budgets
Kevin Pouche, COO of K logix, sits down with Chuck Thomas, Information...
Read More
Breakdown of the MOVEit Transfer Breach and MITRE ATT&CK Mapping
What Happened? MOVEit Transfer is Progress Software’s managed file tra...
Read More
Profile: Eddie Galang, CISO, Port of Long Beach
Download Eddie's Feats of Strength Profile Eddie Galang is a seasoned ...
Read More
Profile: Jessica Sica, Head of Security, Weave
Download Jessica's Feats of Strength Profile Jessica Sica did not foll...
Read More
Profile: Andrew Smeaton, CISO, Afiniti
Download Andrew Smeaton's Profile Andrew Smeaton is a veteran CISO wit...
Read More
The Cybersecurity Talent Market (2023)
THE SKILLS GAP According to a recent report by Cybersecurity Ventures,...
Read More
EP 27: Identity
Kevin Pouche, COO of K logix, sits down with Rob Preta, Head of Cybers...
Read More
How the SEC Views Materiality
The Securities and Exchange Commission (SEC) has adopted a new rule th...
Read More
EP 26: Talent Development & Retention
Kevin Pouche, COO of K logix, sits down with Jay Wiley, Deputy CISO an...
Read More
Updated SEC Rules on Cybersecurity
On July 26th, the Securities and Exchange Commission adopted their muc...
Read More
The Fundamentals of API Security
Introduction: Application Programming Interfaces (APIs) are pivotal dr...
Read More
The Positive Side of AI
OVERVIEW OF ARTIFICIAL INTELLIGENCE In this day and age, Artificial In...
Read More
The CISO’s Guide to Artificial Intelligence
ChatGPT has made Artificial Intelligence (AI) a widespread topic of co...
Read More
ChatGPT in the Workplace
Why to limit employee use, and what it means to your business ChatGPT,...
Read More
Profile: Gernette Wright, IT Security Officer, Schneider Electric
Gernette Wright has over 25 years of experience transforming and build...
Read More

    Subscribe

    Stay up to date with cyber security trends and more