7 Core Controls of a Solid Data Governance Strategy

Data is the lifeblood of every business. This adage is more true today, in the corporate digital transformation era than ever before. Some equate data with oil, while others equate data with ...
Navigating the Future of AI: Understanding AI Regulation

Navigating the Future of AI: Understanding AI Regulation

AI regulation addresses privacy, security, fairness, transparency, and accountability concerns while promoting innovation and benefiting society ...
identity governance security Spera deepfake identity management

What you Missed in the White House National Cybersecurity Strategy

On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: ...
Security Boulevard
cybersecurity ransomware strategy breach prevention strategy cybersecurity

Survey: Reactionary Cybersecurity is Misaligned With Business Goals

A global survey of 409 cybersecurity and IT decision-makers from companies with at least 250 employees suggested that while there is a lot more attention being paid to aligning cybersecurity strategy with ...
Security Boulevard
#112 - Attack Surface Management (with Richard Ford)

ASM: The Best Defense is a Good Offense

About 10 years ago, security was relatively simple because everything occurred on premises. Change releases were tightly controlled by a change ticket and review process. In contrast, current networks consist of auto-scaling ...
Grappling with the Unpredictable Second-Order Effects of LLM

Grappling with the Unpredictable Second-Order Effects of LLM

Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...
Doing the Work: How to Architect a Systematic Security Program, Part 3

Doing the Work: How to Architect a Systematic Security Program, Part 3

Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...
Better Decisions Equal Better Exposure Management

Better Decisions Equal Better Exposure Management

Business success essentially boils down to awareness of potential risks and making good decisions to avoid or mitigate those risks. The businesses that do this well thrive, while businesses that fail in ...
cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

Attackers: Modern Day API Cartographers

| | api, applications, attackers, security, strategy
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing the coastline of New England, drawing a map as they sailed. Instead, they talked to people who did the sailing ...
Security Boulevard
Framework Selection: How to Architect a Systematic Security Program – Part 1

Framework Selection: How to Architect a Systematic Security Program – Part 1

A need for public trust in information systems has driven continuous technological advances and new regulatory requirements, which have in turn made the global cyber threat landscape more complex and connected (see ...