Wayne takes Episode 39 of this CXO Minute to explain why quantum encryption is needed now, even if quantum computing is still years away.
In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.
Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.
Chris shares his Cloud Wars Expo takeaways, including an emphasis on industry-specific clouds, stronger data security, and supply chains.
The discovery includes malicious code with more than 17,000 harmful downloads, says Chris Hughes in Cybersecurity Minute, Episode 21.
The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
In the latest Cybersecurity Minute, Ep. 20, Chris summarizes the White House’s latest move to curb cyberattacks with greater collaboration.
As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
The way that data and collaboration tools, cross-team engagement, and SOAR tools are improving is expanding the how and where that the SOC can add value to an organization.
Kieron looks at how cybersecurity, user rights, data privacy, and interoperability figure into administration of the decentralized virtual world.
With a rapidly evolving threat landscape and higher customer expectations, Security Operations Center’s next steps must involve a new path with modern technologies.
In this Cybersecurity Minute, Ep. 19, Chris analyzes the CNCF releasing its Secure Software Factory guidance and what it means for software security.
The high-level fundamentals are a good starting point for organizations to reduce their vulnerabilities, writes Chris Hughes.
As the Metaverse becomes more ingrained into the worldwide economy, its data will become a valuable attack target. Here’s how to protect it.
Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.
As Chris Hughes explains in Ep. 18 of Cybersecurity Minute, Atlassian’s notification to the public of these vulnerabilities allowed companies to put mitigating controls in place until the patch was released.
Though it’s primarily for the EU, the sweeping privacy regulation will have a lasting impact outside of Europe in regulating data privacy.
If neglected, these areas can be a drain on all the other amazing things security teams may be working on, writes Robert Wood.
In Cybersecurity Minute, Ep. 17, Chris recaps the highlights from the annual report including rises in ransomware and supply chain security attacks.
In Cybersecurity Minute, Ep 16, Chris provides an update on the 2015 Office of Personnel and Management data breach and subsequent settlement for 22 million users.