Beyond the Buzzword: Data’s Crucial Role in Generative AI Security

Generative AI (GenAI) stands out as the “hot new buzzword” for 2023, and for good reason. It promises unprecedented advancements in various fields, including cybersecurity. With every vendor striving to integrate generative AI, understanding its distinctive nature, benefits, and challenges … Beyond the Buzzword: Data’s Crucial Role in Generative AI ... Read More

Democratizing Biometric Identity

Biometric authentication has undergone a revolutionary transformation, shifting from science fiction to a reality that is embedded in the daily lives of hundreds of millions globally. Fingerprint scanning, in particular, has been a stalwart in biometric verification and authentication, securing … Democratizing Biometric Identity Read More » The post Democratizing ... Read More

ICBC Ransomware Incident: A Global Call to Action Against Financial Cyber Threats

The recent ransomware attack on the Industrial and Commercial Bank of China’s (ICBC) U.S. arm is a stark reminder that no institution, no matter how large and ostensibly secure, is immune to the machinations of cybercriminals. This particular strike, believed … ICBC Ransomware Incident: A Global Call to Action Against ... Read More

Crowdsourced Security-as-a-Service

TechSpective Podcast Episode 119   If you want to prevent threat actors from infiltrating or compromising your environment, it helps to see things from the threat actor perspective. This concept has been fundamental to cybersecurity for many years–whether it is … Crowdsourced Security-as-a-Service Read More » The post Crowdsourced Security-as-a-Service ... Read More

Visibility Without Context Is Just Noise

TechSpective Podcast Episode 117   “You can’t protect what you can’t see.” The first time someone said that, I am sure it was very profound. It is an obvious statement, but also very powerful in the context of cybersecurity. If … Visibility Without Context Is Just Noise Read More » ... Read More

Driving Security Culture and Best Practices

TechSpective Podcast Episode 117   Cybersecurity used to be more of a mystical dark art, but over time, businesses and individuals have come to understand just how critical cybersecurity is, and cybersecurity professionals and vendors have recognized that they need … Driving Security Culture and Best Practices Read More » ... Read More
TechSpective Podcast 116 - Chris Gates

Real World Impact of Medical Device Security

TechSpective Podcast Episode 116   Getting hacked sucks in all scenarios. In most cases, though, getting hacked is an inconvenience. In some cases, it is deadly. Having your data stolen, or getting your computer bricked by ransomware is annoying. Getting … Real World Impact of Medical Device Security Read More ... Read More

TransUnion Report Highlights Increasing Risk from Synthetic Identity Fraud

A new and unsettling threat has emerged on the financial horizon: synthetic identity fraud. TransUnion released its “Omnichannel Fraud in H1 2023” report today, which reveals that this modern method of deceit is growing at an unprecedented rate. Synthetic Identity … TransUnion Report Highlights Increasing Risk from Synthetic Identity Fraud ... Read More

Enhancing Identity Security and Permission Management with ConductorOne

In today’s digital landscape, ensuring robust identity security and effective permission management is essential for businesses of all sizes, regardless of region or industry. With the increasing complexity and diversity of IT environments, organizations require a comprehensive solution that can … Enhancing Identity Security and Permission Management with ConductorOne Read ... Read More

Leap into Hybrid Environments and Modern Enterprise Asset Analysis with JupiterOne

JupiterOne recently announced a pivotal expansion of their cyber asset analysis platform. This latest update is centered around catering to the rapidly transforming market that is embracing hybrid infrastructure and showcasing an increasing interest in asset visibility and analysis across … Leap into Hybrid Environments and Modern Enterprise Asset Analysis ... Read More