In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.
In My Metaverse Minute, Ep. 23, Kieron examines a new survey of workers who stated concerns around privacy in virtual office environments.
Aaron Back reviews his time at Cloud Wars Expo and how it differed from his previous conference experiences — in a good way.
When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.
Wayne takes Episode 39 of this CXO Minute to explain why quantum encryption is needed now, even if quantum computing is still years away.
In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.
Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.
Chris shares his Cloud Wars Expo takeaways, including an emphasis on industry-specific clouds, stronger data security, and supply chains.
The discovery includes malicious code with more than 17,000 harmful downloads, says Chris Hughes in Cybersecurity Minute, Episode 21.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
In the latest Cybersecurity Minute, Ep. 20, Chris summarizes the White House’s latest move to curb cyberattacks with greater collaboration.
As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
The way that data and collaboration tools, cross-team engagement, and SOAR tools are improving is expanding the how and where that the SOC can add value to an organization.
Kieron looks at how cybersecurity, user rights, data privacy, and interoperability figure into administration of the decentralized virtual world.
With a rapidly evolving threat landscape and higher customer expectations, Security Operations Center’s next steps must involve a new path with modern technologies.
In this Cybersecurity Minute, Ep. 19, Chris analyzes the CNCF releasing its Secure Software Factory guidance and what it means for software security.
The high-level fundamentals are a good starting point for organizations to reduce their vulnerabilities, writes Chris Hughes.
As the Metaverse becomes more ingrained into the worldwide economy, its data will become a valuable attack target. Here’s how to protect it.
Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.
As Chris Hughes explains in Ep. 18 of Cybersecurity Minute, Atlassian’s notification to the public of these vulnerabilities allowed companies to put mitigating controls in place until the patch was released.