Your Company Culture Can Become A Powerful Cybersecurity Resource
If your organization doesn’t already make security a pillar of its culture, this could be the year to start. That’s because the cybersecurity landscape is changing, due to factors including…
All-in-One: How Cynet is Revolutionizing Cybersecurity for MSPs
Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services due to the demand from their current clients. Though the revenue potential is lucrative, the road for many MSPs…
Publisher’s Spotlight: F5
I was thrilled to catch up with F5 during Black Hat USA 2024. Years ago, when I started an innovative e-commerce company, we used their Big IP product to load…
Publisher’s Spotlight: Endace
Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1. Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture, addressing the challenge of ensuring…
Defense in Diversity: A Strategy for Robust Cybersecurity
The concept of “defense in depth” dates back to ancient times, epitomized by the ramparts, draw-bridge, towers, and battlements surrounding a medieval castle. Cybersecurity’s adaptation of the idea — multiple…
Lead with simplicity: A guide for strengthening security in logistics
Supply chains are the pulse of our global economy. When they falter, the effects can ripple through industries — impacting production lines, delivery schedules, company performance, and, ultimately, customer satisfaction….
Shedding Light on The Dark Web: Enhancing Cybersecurity Through Proactive Monitoring
In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of these marketplaces poses significant threats to personal, corporate and national security. As…
Transparency in Cybersecurity: The Importance of Accurate Vulnerability Disclosures
Recently, the cybersecurity world has been rattled by a series of critical vulnerabilities discovered in Ivanti Connect Secure VPN software. In the wake of these ongoing vulnerability issues, Ivanti has…
Balancing the Scales: Addressing Privacy, Security, and Biases in AI based on the White House Blueprint for an AI Bill of Rights
Within the last few weeks, the major AI competitors OpenAI, Google, and Microsoft unveiled several new products and capabilities of their platforms. Perhaps, most notable was OpenAI’s ability to now…
The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My RSA 2024 started on Sunday, speaking with a group of…
Safeguarding The Backbone: The Critical Imperative to Protect Operational Technology (OT) Devices
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late 2023, there has been a notable increase in attacks on…
Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders
The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions – is immense, which means the potential cyber attack surface is…