Network SecurityProtecting against cross-platform account takeoverMike Britton May 8, 2024A full 70% of security organizations say account takeover has become an even greater threat than ransomware and phishing.
Vulnerability ManagementFour ways to swing for the fences and simplify vulnerability management metricsScott Kuffer May 7, 2024Here’s how to up the security team’s vulnerability management game.
Incident ResponseWhy IR teams now need an incident commanderDebbie Gordon May 6, 2024Here are five traits that security executives should look for in an incident commander -- an IC.
Private equityNote to investors and security pros: drive innovation by going on the offensive Bob Ackerman May 3, 2024A longtime cybersecurity venture capitalist explains why some of his best investments are in people with military backgrounds who have an offensive mindset.
IdentityWe Need an Updated Strategy to Secure IdentitiesMatt CaulfieldMay 2, 2024Like any security control, identity needs to be reevaluated as threats advance.
Cloud SecuritySix common developer security fails that lead to cloud risksTomer FilibaMay 2, 2024By understanding what could go wrong and staying ever-vigilant, DevSecOps teams can reduce cloud security breaches.
Governance, Risk and ComplianceNavigating the cybersecurity career mazeTolgay KizilelmaApril 30, 2024Cyber security careers are a journey with no finish line - so how/where do you start?
Critical Infrastructure SecurityLessons from LOCKED SHIELDS 2024 cyber exerciseParham EftekhariApril 30, 2024JFHQ-DODIN led U.S. involvement in the largest international live-fire cyber defense exercise in the world.