In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash...
Hi, what are you looking for?
In the merry-go-round world of InfoSec technologies and “what’s old is new again,” this year we should include Attack Surface Management with a dash...
Security Analytics and Threat Investigation Are in the Midst of a Sea Change
Managed security services are undergoing a timely and significant transformation, armed with new hyperscalable technology stacks, hybrid enterprise and cross-cloud protection complexities, and a...
The pace at which new confidential computing solutions are penetrating enterprise security architectures and data protection strategies appears to be catching security leaders off...
Confidential Computing Capabilities and Services Will be a Competitive Differentiator for Cloud Providers
The phrase “assume breach” has been transformational to enterprise security investment and defensive strategy for a few years but may now be close to...
As SecOps Teams Increasingly Take on Proactive Risk Reduction, Posture Fatigue Will Grow
Global Companies’ Evaluation of Cybersecurity Solutions Selection Has Been Steadily Changing
Businesses’ digital transformations continue to show that being relative and competitive are directly tied to the ability to develop and harness software. As the...
Cloud-based Cyber Ranges Will Change the Future of Training and Certifying Security and DevOps Professionals
If DevOps represents the union of people, process, and technology to continually provide value to customers, then DevSecOps represents the fusion of value and...
For Cyberdefense to Progress, We Must Break Through the Cultural Barrier of Breach Disclosure Shame