CTO NTT Attivo Networks AD Red Forest, or Well-Managed Active Directory

3 Ways the CTO Can Fortify the Organization in the Age of Generative AI

Most enterprises testing the generative AI waters primarily lean on their CISOs and general counsel. But the CTO should be involved, too ... Read More
Security Boulevard
The Incydr Architecture Then, Now, and Next: Our New Data Storage Fabric

The Incydr Architecture Then, Now, and Next: Our New Data Storage Fabric

| | Product
As part of our commitment to security, availability, and resiliency we are advancing our infrastructure strategy through new AWS investments. Read on for the why, how and when, and to learn about these upcoming improvements. When we first developed Incydr, we knew we needed to build with performance and scale ... Read More
The Incydr Architecture Then, Now, & Next: Our New Data Storage Fabric

The Incydr Architecture Then, Now, & Next: Our New Data Storage Fabric

| | Product
As part of our commitment to security, availability, and resiliency we are advancing our infrastructure strategy through new AWS investments. Read on for the why, how and when, and to learn about these upcoming improvements. When we first developed Incydr, we knew we needed to build with performance and scale ... Read More
The Post-COVID World is a Great Opportunity to Build a DevSecOps Culture

The Post-COVID World is a Great Opportunity to Build a DevSecOps Culture

| | Industry Insights
Rob Juncker, CTO of Code42, and Gene Kim, author, researcher and founder of IT Revolution, got together (virtually, of course) to talk about the post-COVID world and how the fallout has opened the door for organizations to build a powerful new DevSecOps culture. Their conversations often involve wonderful tangents that ... Read More
The Post-COVID World is a Great Opportunity to Build a DevSecOps Culture

The Post-COVID World is a Great Opportunity to Build a DevSecOps Culture

| | Industry Insights
Rob Juncker, CTO of Code42, and Gene Kim, author, researcher and founder of IT Revolution, got together (virtually, of course) to talk about the post-COVID world and how the fallout has opened the door for organizations to build a powerful new DevSecOps culture. Their conversations often involve wonderful tangents that ... Read More
Code42 2020 Data Exposure Report: The Risky Rise of Collaboration Culture

Code42 2020 Data Exposure Report: The Risky Rise of Collaboration Culture

| | Industry Insights
As we’ve covered in this blog in quite some depth, mitigating insider threat isn’t easy. Workers who are given trusted access to applications and data oftentimes sit in a great position to abuse that trust – either maliciously or unintentionally.  After all, they usually know where the organization’s most valuable ... Read More
Code42 2020 Data Exposure Report: The Risky Rise of Collaboration Culture

Code42 2020 Data Exposure Report: The Risky Rise of Collaboration Culture

| | Industry Insights
As we’ve covered in this blog in quite some depth, mitigating insider threat isn’t easy. Workers who are given trusted access to applications and data oftentimes sit in a great position to abuse that trust – either maliciously or unintentionally.  After all, they usually know where the organization’s most valuable ... Read More
From Carelessness to Activism — Why Insiders Do What They Do

From Carelessness to Activism — Why Insiders Do What They Do

| | Industry Insights
Whenever the subject of insider threat arises, the discussion gravitates toward the insider who has acted maliciously in some way. People often think of the executive or staffer who stole confidential information about an impending corporate transaction or intellectual property, such as source code, and intentionally exposed or sold it ... Read More
From Carelessness to Activism — Why Insiders Do What They Do

From Carelessness to Activism — Why Insiders Do What They Do

| | Industry Insights
Whenever the subject of insider threat arises, the discussion gravitates toward the insider who has acted maliciously in some way. People often think of the executive or staffer who stole confidential information about an impending corporate transaction or intellectual property, such as source code, and intentionally exposed or sold it ... Read More
The 5 Big Themes I’ll Be Looking for Next Week at Black Hat

The 5 Big Themes I’ll Be Looking for Next Week at Black Hat

| | Industry Insights
If there was one annual event that encapsulates cybersecurity, it’s Black Hat. For more than 20 years, thousands have gathered to learn security during the Black Hat training sessions and see cutting-edge research on display at the Black Hat Briefings. Black Hat has been doing this every year in Las ... Read More
Loading...