Eliminating friction and making AppSec scalable starts with designing solutions built for developers
When It Comes to Security, Don’t Overlook Your Linux Systems
As I pointed out earlier this year, Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that distinction goes to HTML and Javascript – don’t think you can ignore them. Linux-based attacks are very much still happening.
3 Considerations When Aligning Organizational Structure to IT/OT Governance
Over the last few years, the majority of large enterprises have come a long way in defining their operational technology (OT) governance strategies and making meaningful advances in risk reduction. Technology innovations aside, the top success factors I’ve observed are the way in which governance programs are structured and executed. Most significant is the guiding principle that organizational structure drives strategy.
The Advantages of Threat Intelligence for Combating Fraud
It’s important to be familiar with multiple types of fraud that could affect your organization
How to Improve Mean Time to Detect for Ransomware
Training for multiple situations will help your security team make decisions more quickly
Cyber Safety for Summer Vacation
Let’s get back to summer travel.
My original title for this byline was “Hack for the Holidays,” but I decided that my ever-friendly content editor would likely reject the thought – however, the statement does highlight an area we should all consider.
How Technology Can Think Globally and Act Locally to Inform Global Cyber Policies
As a cybersecurity professional, I appreciate the impact that cyber policy can have on the adoption of and effective utilization of technology. We see this working today in very advanced, mature industries. In the automotive industry, policies around safety for instance, have done wonders to reduce the number of injuries resulting from an accident. Likewise, policies for manufacturing and chemical production help reduce the risk associated with handling dangerous chemicals.
How Economic Changes and Crypto’s Rise Are Fueling the use of “Cyber Mules”
The rise of cryptocurrency has ushered in a new era of money laundering
Universal ZTNA is Fundamental to Your Zero Trust Strategy
Universal ZTNA ensures that every user and device has secure access to the applications they need to do their jobs
The Future of Endpoint Management
Making each endpoint resilient is paramount to implementing a successful defense strategy