Advancing DevSecOps Into the Future
If DevOps represents the union of people, process, and technology to continually provide value to customers, then DevSecOps represents the fusion of value and security provided to those same customers.
read more
Collaborate Disseminate
If DevOps represents the union of people, process, and technology to continually provide value to customers, then DevSecOps represents the fusion of value and security provided to those same customers.
read more
For Cyberdefense to Progress, We Must Break Through the Cultural Barrier of Breach Disclosure Shame
read more
As public cloud providers continue to elevate their platforms’ default enterprise protection and compliance capabilities to close gaps in their portfolio or suites of in-house integrated security products, CISOs are increasingly looking to the use and … Continue reading The Changing Face of Cloud Threat Intelligence
It’s been almost a decade since the first commercial “for-profit” bug bounty companies launched leveraging crowdsourced intelligence to uncover security vulnerabilities and simultaneously creating uncertainty for boutique security companies around the … Continue reading How Commercial Bug Hunting Changed the Boutique Security Consultancy Landscape
As homes, workplaces, and cities digitally transform during our Fourth Industrial Revolution, many of those charged with securing this digital future can find it difficult to “level up” from the endpoints and focus on defining and solving the larger pr… Continue reading Securing Autonomous Vehicles Paves the Way for Smart Cities
Network Security Expertise is Needed More Than Ever Inside Security Operations Centers and on DevOps Teams
read more
Continue reading Cloud is Creating Security and Network Convergence
The mechanics of prioritizing one vulnerability’s business risk over another has always been fraught with concern. What began as securing business applications and infrastructure from full-disclosure bugs a couple of decades ago, has grown to encompass… Continue reading Stop Using CVSS to Score Risk
Make Sure You Understand the Root Cause of the Vulnerabilities or Attack Vectors Behind the Next Over-Hyped Stunt Hack
Every year, at least one mediocre security vulnerability surprisingly snatches global media attention, causing CISOs and security res… Continue reading Harnessing Stunt Hacking for Enterprise Defense
As organizations pursue their digital transformation dreams, they’ll migrate from on-premises SIEM to cloud-based SIEM. In the process of doing so, CISOs are taking a closer look at their previous security incident and event log retention policies, and… Continue reading Digital Transformation Makes the Case for Log Retention in Cloud SIEMs