Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threat … Continue reading Vulnerability prioritization is only the beginning

How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

Cybersecurity isn’t just about firewalls and antivirus. It’s about understanding how your defenses, people, and processes work together. Just like Google Maps revolutionized navigation, process mapping can revolutionize how you understand a… Continue reading How to create your cybersecurity “Google Maps”: A step-by-step guide for security teams

The evolution of security metrics for NIST CSF 2.0

CISOs have long been spreadsheet aficionados, soaking up metrics and using them as KPIs for security progress. These metrics have traditionally measured specific systems or single indicators — vulnerabilities detected, percentage of vulnerabilities pat… Continue reading The evolution of security metrics for NIST CSF 2.0

What is cybersecurity mesh architecture (CSMA)?

Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a … Continue reading What is cybersecurity mesh architecture (CSMA)?

Insider threats can damage even the most secure organizations

Insider threats encompass both intentional and unintentional actions. Some insiders may maliciously exploit their access for personal gain, espionage, or sabotage, while others may inadvertently compromise security protocols due to negligence, lack of … Continue reading Insider threats can damage even the most secure organizations

Preventing insider access from leaking to malicious actors

In this Help Net Security video, John Morello, CTO of Gutsy, discusses the often-overlooked aspect of cybersecurity – the offboarding process. He outlines the real-world implications and potential impact on an organization’s security postur… Continue reading Preventing insider access from leaking to malicious actors

Twistlock Founders Score Whopping $51M Seed Funding for Gutsy

Serial entrepreneurs bank an unusually large seed round to apply process mining techniques to solve security governance problems.
The post Twistlock Founders Score Whopping $51M Seed Funding for Gutsy appeared first on SecurityWeek.
Continue reading Twistlock Founders Score Whopping $51M Seed Funding for Gutsy