Guest Blog Post

GUEST ESSAY: The case for making real-time business continuity a frontline cybersecurity priority
It starts with a ripple of confusion, then panic. Hospital systems freeze mid-procedure. Electronic medical records become inaccessible. Related: Valuable intel on healthcare system cyber exposures In the ICU, alarms blare as ...

GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure
In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion — a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, ...

GUEST ESSAY: How AI co-pilots boost the risk of data leakage — making ‘least privilege’ a must
The rise of AI co-pilots is exposing a critical security gap: sensitive data sprawl and excessive access permissions. Related: Weaponizing Microsoft’s co-pilot Until now, lackluster enterprise search capabilities kept many security risks ...

GUEST ESSAY: President Biden’s cybersecurity executive order is an issue of national security
President Biden’s detailed executive order relating to cybersecurity is great to see. Biden’s order reflects the importance of cybersecurity at the highest levels – it is an issue of national security and ...

GUEST ESSAY: The key role static code analyzers play in detecting coding errors, eliminating flaws
In the modern world of software development, code quality is becoming a critical factor that determines a project success. Errors in code can entail severe consequences. Related: The convergence of network, application ...

Guest Essay: API security-related exposures rose steeply across all industries in Q3 2024
Application Programming Interfaces (APIs) have become the backbone of modern enterprises, facilitating seamless communication between both internal systems and external partners. Related: Biden-Harris administration opens Supply Chain Resilience Center As organizations increasingly ...

GUEST ESSAY: Massive NPD breach tells us its high time to replace SSNs as an authenticator
Ever since the massive National Public Data (NPD) breach was disclosed a few weeks ago, news sources have reported an increased interest in online credit bureaus, and there has been an apparent ...

GUEST ESSAY: How cybercriminals are using ‘infostealers’ to sidestep passwordless authentication
Passwords have been the cornerstone of basic cybersecurity hygiene for decades. Related: Passwordless workpace long way off However, as users engage with more applications across multiple devices, the digital security landscape is ...

GUEST ESSAY: Taking a systematic approach to achieving secured, ethical AI model development
AI has the potential to revolutionize industries and improve lives, but only if we can trust it to operate securely and ethically. Related: The key to the GenAI revolution By prioritizing security ...

GUEST ESSAY: NIST’s Cybersecurity Framework update extends best practices to supply chain, AI
The National Institute of Standards and Technology (NIST) has updated their widely used Cybersecurity Framework (CSF) — a free respected landmark guidance document for reducing cybersecurity risk. Related: More background on CSF ...