Blog

Header_strip
blog-bg-shape

Posts about:

Resources (3)

Risk Assessment Q&A
The scale of what risk assessments cover varies based on the provider,...
Read More
Digital Supply Chain Risk Management: What, Why and How to Handle it
Many people use the phrase “Digital Supply Chain Risk”, but it is ofte...
Read More
Cloud Native Application Protection Platform (CNAPP)
Cloud Native Application Protection Platform (CNAPP) is “an integrated...
Read More
Cloud Vulnerability and Secure Access Service Edge (SASE)
The concept of the cloud became a mainstream phenomenon in the mid-200...
Read More
F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
Last week F5 released an update to its BIG-IP product, patching a vuln...
Read More
Alert - APT Cyber Tools Targeting ICS/SCADA Devices
This is an alert for critical infrastructure organizations regarding A...
Read More
Tester Talk: Recent Trends in Combatting Threats
Security programs are tasked with the on-going mission of keeping pace...
Read More
K logix: A Year-in-Review 2021
With the multitude of challenges continuing to face our industry (redu...
Read More
Taking a Proactive Approach to Cybersecurity Budgets
When we speak with CISOs, it is evident there is not a one size fits a...
Read More
Cybersecurity Budgets: By the Numbers
Since no two cybersecurity budgets are the same, we conducted research...
Read More
CISO Responsibilities
In this issue of the magazine, we interview effective security leaders...
Read More
IAM in 2021: The New Security Perimeter
Identity and Access Management (IAM) is a strategic goal for many CISO...
Read More
The Top 20 Cybersecurity Conferences in 2021
Whether you’re trying to safeguard your own company or provide informa...
Read More
The Strategic Guide to the MITRE ATT&CK Framework
Who is MITRE? Before diving into the framework, let's take a high-leve...
Read More
Profile: Kathy Hughes, CISO, Northwell Health
AT THE HELM OF EMERGING DEPARTMENTS Kathy Hughes began her career in m...
Read More

    Subscribe

    Stay up to date with cyber security trends and more