Ransomware-Proof Your Data Backups with Immutability
TechSpective Podcast Episode 130 Backing up data has been a fundamental requirement for IT since data began. In the age of ransomware, though, data backups have had a bit of a rollercoaster ride. When ransomware first emerged, data backups […] The post Ransomware-Proof Your Data Backups with Immutability appeared ... Read More
Unearthing Identity Threat Exposures
Organizations must navigate through a tumultuous sea of cybersecurity threats today. As businesses increasingly transition to the cloud and embrace remote work, the complexity of managing digital identities has exponentially grown, unveiling a myriad of vulnerabilities that cybercriminals are keen […] The post Unearthing Identity Threat Exposures appeared first on ... Read More
Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights
The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to delve into the concept of predictive cyberthreat insights […] The post Beyond Detection: Enhancing Your Security Posture with ... Read More
The Strategic Partnership Elevating API and Endpoint Security
Salt Security has announced a pivotal partnership with CrowdStrike. This collaboration marks a significant milestone for businesses seeking robust, integrated security solutions that cover both endpoints and the increasingly critical API layer. Let’s take a closer look at the details […] The post The Strategic Partnership Elevating API and Endpoint ... Read More
Simplifying Cybersecurity from Confusion to Clarity
Cybersecurity is a dynamic and fast-paced industry. Staying ahead of threats requires constant innovation and a keen understanding of the landscape’s evolving challenges. I recently spoke with Ric Smith, Chief Product and Technology Officer for SentinelOne, about SentinelOne’s efforts to […] The post Simplifying Cybersecurity from Confusion to Clarity appeared ... Read More
Strategic Decision-Making: Balancing Budgets and Security
TechSpective Podcast Episode 124 Cybersecurity is cyclical. Over the past two decades that I have been working in and writing about security, the market has gone from an array of point solutions to consolidated “Swiss Army knife” platforms that […] The post Strategic Decision-Making: Balancing Budgets and Security appeared ... Read More
The Vital Role of SBOMs and the Pioneering Solutions of Tanium
The concept of protecting from risks originating from the Software Supply Chain (SSC) has emerged as a cornerstone for robust digital defense in an era with growing software supply chain attacks. A critical component to understand for protecting the SSC […] The post The Vital Role of SBOMs and the ... Read More
Using LLMs to Automate and Streamline Cyber Threat Analysis
TechSpective Podcast Episode 122 There are a number of steps involved in cyber threat analysis to review event information and determine which events are benign or innocuous and which are malicious–or at least deserve greater scrutiny. For the most … Using LLMs to Automate and Streamline Cyber Threat Analysis ... Read More
Navigating Cyber Threats This Holiday Season
The holiday season, with its festive cheer and bustling shopping activity, also brings with it a less joyful aspect: a significant increase in cyber threats. While you’re out there trying to spread joy, cybercriminals exploit this time of year with … Navigating Cyber Threats This Holiday Season Read More » ... Read More
SBOMs: The Hidden Ingredient in Secure Software Recipes
TechSpective Podcast Episode 121 SBOMs (Software Bill of Materials) have gotten a lot of attention in the past year. Think of SBOMs as the ingredient list of software – a detailed catalog of every component, library, and module that … SBOMs: The Hidden Ingredient in Secure Software Recipes Read ... Read More