Frank Domizio covers four features of data backup and recovery software, and why they’re essential to protect against disasters, ransomware, and other incidents.
Cybersecurity Minute
Sensitive data is increasingly being filtered through SaaS solutions, which makes securing them more important than ever, says Robert Wood.
Frank Domizio explains the benefits of cybersecurity supply chain risk management (C-SCRM) and how to pick the right tools.
Chris Hughes introduces Chainguard, a software supply chain security provider that’s among the Cybersecurity as a Business Enabler Top 10 companies.
Software composition analysis tools are valuable assets to secure systems and protect organizations, says Frank Domizio, but they will also directly benefit software developers.
How do cybersecurity companies manage the complex nature of IT environments? In this Cybersecurity Minute, Robert Wood explains why portfolio companies have the solutions.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
In episode 31, Chris Hughes explains the NSA’s recent release of software supply chain security guidance for developers.
In Cybersecurity Minute, Ep. 31, Chris Hughes says it’s clear that the Senate’s Securing Open Source Software Act emphasizes how critical open-source software is to national security and society.
In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.
In Cybersecurity Minute, Ep. 29, Chris examines a recent data breach compromising the security software provider’s proprietary information.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.
In Cybersecurity Minute Episode 27, Chris Hughes reacts to major allegations against Twitter’s security policies, including potential interference from foreign agencies.
In Cybersecurity Minute, Episode 26, Chris Hughes reacts to the recently discovered attack on cloned version of GitHub repositories carrying malicious code.
In Cybersecurity Minute, Ep. 25, Chris reacts to a recently-discovered bug within the Slack platform compromising user passwords since 2017.
In Cybersecurity Minute, Episode 24, Chris unpacks the newly signed bill, which is designed to boost U.S. domestic semiconductor chip production.
In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.
In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.
The discovery includes malicious code with more than 17,000 harmful downloads, says Chris Hughes in Cybersecurity Minute, Episode 21.