#112 - Attack Surface Management (with Richard Ford)

ASM: The Best Defense is a Good Offense

About 10 years ago, security was relatively simple because everything occurred on premises. Change releases were tightly controlled by a change ticket and review process. In contrast, current networks consist of auto-scaling ...
Grappling with the Unpredictable Second-Order Effects of LLM

Grappling with the Unpredictable Second-Order Effects of LLM

Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...

A CISO’s Guide to Building a Strategic Relationship with the BOD

A chief information security officer’s (CISO’s) role ultimately is to help their organization’s board of directors (BOD) understand the potential impact of cyber threats on the organization. When this strategic relationship is ...