Quantifying and Buying Down Cybersecurity Risk

Seven Ways DSPM Helps CISOs Buy Down Cyber Risk

Have you heard someone indicate they buy down risk? In today’s digital economy, cyber risk is a top concern of everyone from the Board and CEO to the CFO and ultimately the ...
How is Groq so Fast? An Overview of Groq's TSP Architecture

How is Groq so Fast? An Overview of Groq’s TSP Architecture

An overview of Groq's (surprisingly easy to read) whitepaper ...
lock

Miggo Unfurls Real-Time Application Detection and Response Platform

The platform analyzes application interactions to identify cyberattacks and applies mitigations to limit the attack's impact ...
Security Boulevard
Test & Evaluation Techniques for Meeting M-24-10 Mandates to Manage Generative AI Risk

Test & Evaluation Techniques for Meeting M-24-10 Mandates to Manage Generative AI Risk

Overview The release of the National Institute of Standards and Technology (NIST)’s AI Risk Management Framework (AI RMF) helped put a framework around how testing would enable organizations to manage and mitigate ...
The Growing Menace of Obfuscated Phishing Scams

From Caesar to Cyberspace: The Growing Menace of Obfuscated Phishing Scams

In the world of cybersecurity, it often feels like we’re revisiting familiar problems, albeit with a modern twist. The essence of the issue isn’t about the emergence of entirely new types of ...
HHS reproductive health data privacy

HHS Strengthens Privacy of Reproductive Health Care Data

The new directive prohibits data disclosure when law enforcement agencies want to investigate people, healthcare providers, or others seeking reproductive care that is lawful where the care is given ...
Security Boulevard
High-Risk Customers: How to Identify & Mitigate Risky Clients

High-Risk Customers: How to Identify & Mitigate Risky Clients

| | learning center
High-risk customers can endanger your business. Learn how to identify and manage 7 different kinds of high-risk customers to maintain a secure business environment ...

Bridging the Skills Gap in Data Centers with DCIM Software

| | DCIM Tools
The rapid evolution of technology and increasing reliance on digital infrastructure highlight a critical challenge facing the data center industry: a growing skills gap and talent shortage. As organizations struggle to find ...

Who Are APT29?

Russian hacker group APT29 is one of the most technically skilled and organized threat actors ...

USENIX Security ’23 – ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles

Authors/Presenters: *Sangdon Park, Osbert Bastani, Taesoo Kim* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s ...

Secure Guardrails