Grappling with the Unpredictable Second-Order Effects of LLM

Grappling with the Unpredictable Second-Order Effects of LLM

Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...
Doing the Work: How to Architect a Systematic Security Program, Part 3

Doing the Work: How to Architect a Systematic Security Program, Part 3

Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...
Better Decisions Equal Better Exposure Management

Better Decisions Equal Better Exposure Management

Business success essentially boils down to awareness of potential risks and making good decisions to avoid or mitigate those risks. The businesses that do this well thrive, while businesses that fail in ...
NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

Attackers: Modern Day API Cartographers

| | api, applications, attackers, security, strategy
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing the coastline of New England, drawing a map as they sailed. Instead, they talked to people who did the sailing ...
Security Boulevard
Framework Selection: How to Architect a Systematic Security Program – Part 1

Framework Selection: How to Architect a Systematic Security Program – Part 1

A need for public trust in information systems has driven continuous technological advances and new regulatory requirements, which have in turn made the global cyber threat landscape more complex and connected (see ...

Part 3 – Trends in the Cybersecurity Talent Marketplace in the Face of Sustained Shortages

I’ve written previously about how I believe a team’s expertise and talent are the most important factors in determining the success of a cybersecurity program. I’d like to elaborate a bit more ...

Part 2 – Adapting Security Strategy to the Rise of Opportunistic Attacks

Over the past two years, we’ve seen a number of our clients’ security programs re-orient to prepare for potential ransomware incidents. Much of these preparations have focused on the controls and processes ...

Part I – CyberSecurity is Adversarial, and What that Means for Security Strategy

I have an impression that in the course of the day to day grind, many security leaders have lost sight of a core tenant of cybersecurity: that it is adversarial. Ultimately, the ...
Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

How to Build a Cloud Security Strategy

As the head of security at a cloud-forward organization, you are a security and risk expert with strong business acumen. On your shoulders falls the difficult task of detecting security issues as ...
Security Boulevard

Factors You Should Consider for an Optimal Hybrid Cloud Strategy

Cloud technology is a powerful tool with unmeasurable potential. Across the globe, companies are harnessing the cloud to propel their business solutions. However, there are always some companies that cannot entirely shift ...