Friday, March 1, 2024
GenAI Influencing the Secure Code Review Profession
›
It’s tough to be a secure code reviewer. There are already over 700 programming languages according to Wikipedia, and seemingly more langua...
Thursday, October 19, 2023
A SAFE Journey to Selling Devices to Cloud and Datacenter Providers
›
Observations from the OCP Global Summit | San Jose, CA | October, 18, 2023 If you missed it, there was a significant launch of the Open Comp...
Tuesday, June 20, 2023
Why Cybersecurity is Critical in MLOps
›
Larger and more sophisticated businesses will lean into building out their in-house data science teams and capabilities If your business rel...
Thursday, March 30, 2023
What to Consider When Building an Autonomous SOC
›
Today’s threat landscape demands more from IT and security professionals than ever before. Schools are being forced to shut down due to rans...
Thursday, September 8, 2022
It’s Time for Security Analytics to Embrace the Age of Science Over Art
›
Security analytics has traditionally been approached with a “hunt and peck” mentality, which has made the process of uncovering and respondi...
Tuesday, March 29, 2022
Why the SOC Needs to Learn from the Aviation Industry
›
The cybersecurity industry has spent a lot of time talking about improving the analyst experience while not making significant improvements,...
Thursday, December 9, 2021
You May Not Have Asked, But The SOC Evolution Answered Anyways
›
Let’s get the obvious out of the way: The attack surface is growing exponentially and diversely. Bigger shark, same small boat The environme...
Tuesday, May 25, 2021
The Rise of Continuous Attack Surface Management
›
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management wit...
‹
›
Home
View web version