Posts about:

Resources (3)

Cloud Vulnerability and Secure Access Service Edge (SASE)
The concept of the cloud became a mainstream phenomenon in the mid-200...
Read More
F5 BIG-IP Unauthenticated RCE Vulnerability (CVE-2022-1388)
Last week F5 released an update to its BIG-IP product, patching a vuln...
Read More
Alert - APT Cyber Tools Targeting ICS/SCADA Devices
This is an alert for critical infrastructure organizations regarding A...
Read More
Tester Talk: Recent Trends in Combatting Threats
Security programs are tasked with the on-going mission of keeping pace...
Read More
K logix: A Year-in-Review 2021
With the multitude of challenges continuing to face our industry (redu...
Read More
Taking a Proactive Approach to Cybersecurity Budgets
When we speak with CISOs, it is evident there is not a one size fits a...
Read More
Cybersecurity Budgets: By the Numbers
Since no two cybersecurity budgets are the same, we conducted research...
Read More
CISO Responsibilities
In this issue of the magazine, we interview effective security leaders...
Read More
IAM in 2021: The New Security Perimeter
Identity and Access Management (IAM) is a strategic goal for many CISO...
Read More
The Top 20 Cybersecurity Conferences in 2021
Whether you’re trying to safeguard your own company or provide informa...
Read More
The Strategic Guide to the MITRE ATT&CK Framework
Who is MITRE? Before diving into the framework, let's take a high-leve...
Read More
Profile: Kathy Hughes, CISO, Northwell Health
AT THE HELM OF EMERGING DEPARTMENTS Kathy Hughes began her career in m...
Read More
Profile: Pat Darienzo, CISO, Catholic Health Services of Long Island
“The healthcare industry is at a crossroads,” says Pat Darienzo, the C...
Read More
Profile: John Whiting, CISO, DDB
DDB is a large, global advertising network with 15,000 employees at se...
Read More
Profile: Dr. David Reis, CISO, Lahey Health
Read More


    Stay up to date with cyber security trends and more