Ransomware-Proof Your Data Backups with Immutability

TechSpective Podcast Episode 130   Backing up data has been a fundamental requirement for IT since data began. In the age of ransomware, though, data backups have had a bit of a rollercoaster ride. When ransomware first emerged, data backups […] The post Ransomware-Proof Your Data Backups with Immutability appeared ... Read More

Unearthing Identity Threat Exposures

Organizations must navigate through a tumultuous sea of cybersecurity threats today. As businesses increasingly transition to the cloud and embrace remote work, the complexity of managing digital identities has exponentially grown, unveiling a myriad of vulnerabilities that cybercriminals are keen […] The post Unearthing Identity Threat Exposures appeared first on ... Read More

Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights

The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to delve into the concept of predictive cyberthreat insights […] The post Beyond Detection: Enhancing Your Security Posture with ... Read More

The Strategic Partnership Elevating API and Endpoint Security

Salt Security has announced a pivotal partnership with CrowdStrike. This collaboration marks a significant milestone for businesses seeking robust, integrated security solutions that cover both endpoints and the increasingly critical API layer. Let’s take a closer look at the details […] The post The Strategic Partnership Elevating API and Endpoint ... Read More

Simplifying Cybersecurity from Confusion to Clarity

Cybersecurity is a dynamic and fast-paced industry. Staying ahead of threats requires constant innovation and a keen understanding of the landscape’s evolving challenges. I recently spoke with Ric Smith, Chief Product and Technology Officer for SentinelOne, about SentinelOne’s efforts to […] The post Simplifying Cybersecurity from Confusion to Clarity appeared ... Read More

Strategic Decision-Making: Balancing Budgets and Security

TechSpective Podcast Episode 124   Cybersecurity is cyclical. Over the past two decades that I have been working in and writing about security, the market has gone from an array of point solutions to consolidated “Swiss Army knife” platforms that […] The post Strategic Decision-Making: Balancing Budgets and Security appeared ... Read More

The Vital Role of SBOMs and the Pioneering Solutions of Tanium

| | SBOM, Security Awareness, Tanium
The concept of protecting from risks originating from the Software Supply Chain (SSC) has emerged as a cornerstone for robust digital defense in an era with growing software supply chain attacks. A critical component to understand for protecting the SSC […] The post The Vital Role of SBOMs and the ... Read More

Using LLMs to Automate and Streamline Cyber Threat Analysis

TechSpective Podcast Episode 122   There are a number of steps involved in cyber threat analysis to review event information and determine which events are benign or innocuous and which are malicious–or at least deserve greater scrutiny. For the most … Using LLMs to Automate and Streamline Cyber Threat Analysis ... Read More

Navigating Cyber Threats This Holiday Season

The holiday season, with its festive cheer and bustling shopping activity, also brings with it a less joyful aspect: a significant increase in cyber threats. While you’re out there trying to spread joy, cybercriminals exploit this time of year with … Navigating Cyber Threats This Holiday Season Read More » ... Read More

SBOMs: The Hidden Ingredient in Secure Software Recipes

TechSpective Podcast Episode 121   SBOMs (Software Bill of Materials) have gotten a lot of attention in the past year. Think of SBOMs as the ingredient list of software – a detailed catalog of every component, library, and module that … SBOMs: The Hidden Ingredient in Secure Software Recipes Read ... Read More