Governance, Risk and ComplianceNavigating the cybersecurity career mazeTolgay KizilelmaApril 30, 2024Cyber security careers are a journey with no finish line - so how/where do you start?
Critical Infrastructure SecurityLessons from LOCKED SHIELDS 2024 cyber exerciseParham EftekhariApril 30, 2024JFHQ-DODIN led U.S. involvement in the largest international live-fire cyber defense exercise in the world.
BreachResidential proxies are a nightmare on the horizon – and the problem will only get worseJackie WadhwaApril 30, 2024Attackers look to exploit residential proxies to launch account takeover on ecommerce customers and then ultimately move into corporate networks.
Security Strategy, Plan, BudgetWhat to know about each stage of the CISO maturation cycleJavier DominguezApril 29, 2024Here’s a blueprint on the skills and types of people needed for the CISO role as the company evolves.
Security Strategy, Plan, BudgetFive ways security leaders can demonstrate the business value of cybersecuritySteve DurbinApril 26, 2024Here’s how CISOs can get board members to understand that the security team puts the business first.
AI/MLHow an adaptive approach can stop AI-based DDoS attacksGary SockriderApril 25, 2024In the AI era, companies need tools that can help them adapt in real-time as DDoS attacks happen, not after the fact.
AI/MLTop AI risks and fixes: Going beyond the Hype Cycle FUDMike Britton April 24, 2024There are a lot of juicy and theoretical AI cybersecurity risks. Let's look at the real ones and how to mitigate them for a change.
Vulnerability ManagementNavigating the ethical frontiers of our digital ecosystemCallie Guenther April 23, 2024Security pros must always remember that we are custodians of the digital realm and it’s our job to keep people safe.