Software Monocultures: a Net Positive for Cybersecurity
By Andrew Plato, CEO, Zenaciti For many years, I had the poster at the top of this article in my office. I liked the cats. Now, I look at that poster and see more than […]
By Andrew Plato, CEO, Zenaciti For many years, I had the poster at the top of this article in my office. I liked the cats. Now, I look at that poster and see more than […]
CyberRisk Alliance (CRA) has released its Cybersecurity Buyer’s Intelligence Report (CBIR), which is entitled “AI in Cybersecurity: Secret weapon or hidden threat?” The report covers the growing interest and concerns surrounding the integration of artificial […]
The 2024 edition of the biennial cybersecurity report from Deloitte and the National Association of Chief Information Officers (NASCIO) found that 86% of state chief information security officers (CISOs) say their responsibilities are growing, yet […]
By Amy de La Lama, Christian Auty, or Daniel Rockey, of Bryan Cave Leighton Paisner LLP With the recent wave of ransomware and other security incidents, it is now more important than ever for impacted […]
By Andy Ruth & James Wilt Can Al Capture the Human Experience? Of course it can! AI is the silver bullet that can be used to achieve any objective. And GenAI makes a great wedding […]
By Lawrence A. Gordon Cyber risk is a critical concern to corporate executives, government agencies and politicians in today’s digital world of interconnected information systems. Indeed, studies indicate that cyber risk is the, or one […]
By Will Sweeney, Managing Partner, Zaviant It’s no secret that the cost to mitigate a data breach is skyrocketing. According to the Identity Theft Resource Center, the total number of breach victims jumped nearly 500% […]
By Paul Preiss I was just finishing a talk on Living with Legacy, which covers a great number of concepts related to maintainability and viability in legacy systems at UberConf in Denver when all of […]
By Vaibhav Malik, Partner Solutions Architect, Cloudflare In an era where cyber threats are constantly evolving and becoming more sophisticated, traditional security models are proving inadequate. The concept of Zero Trust Architecture (ZTA) has emerged […]
By Utsav Adhikari, of Logpoint Originally developed for federal use, the National Institute for Standards and Technology (NIST) Cybersecurity Framework (CSF) has been widely adopted across the world (and translated into numerous languages) by organisations […]