Software composition analysis tools are valuable assets to secure systems and protect organizations, says Frank Domizio, but they will also directly benefit software developers.
cybersecurity as an enabler
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
In this Data Modernization Battleground moment, Chris says that cybersecurity professionals must understand data inventory, how businesses are using data, and who has access to data.
In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.
In this Let’s Talk Data podcast, Quest Software’s Richard Rule explains why and how the LATAM region is “behind the curve” in data management.
In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.
In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.
In today’s digitally-driven world, fostering cyber resilience in global, digital ecosystems is critical to ensure secure innovation.
Multi-cloud services are often associated with their own identities, permissions, authentication, and authorization activities.
In this Cybersecurity Minute, Chris discusses action being taken by the SEC to ensure cybersecurity expertise at the board level.
Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.
In this Cybersecurity Minute, Chris reports an advisory from federal agencies warning about nation-state hackers.
Security monitoring is one part of an overall effective security strategy. What tools will compliment your organizations strategy?
There’s a tremendous opportunity for the CISO to collaborate with the CFO, as finance and security play a significant role for organizations.
What role should the CISO be reporting to? What key activities will they have oversight and provide expertise on?
In this Cybersecurity Minute, Chris covers a recent statement from the White House about the urgency for organizations to increase fundamental cybersecurity.
In this Cybersecurity Minute, Chris Hughes highlights Google Cloud’s recent acquisition of Mandiant to provide greater cloud cybersecurity offerings.