It’s time to get off the treadmill: Why you should understand adversary playbooks

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The...

Having a boardroom conversation about cybersecurity and material risk

Having a boardroom conversation about cybersecurity and material risk

Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture.

4 things CISOs should stress to the board of directors about cloud security

4 things CISOs should stress to the board of directors about cloud security

It's essential for CISOs to get involved in the cloud conversation, so that they can communicate to those at the highest level of the organization why security should not be an afterthought.

On cybersecurity and IT teams of the future, we'll all be SREs

On cybersecurity and IT teams of the future, we'll all be SREs

Organizations that adopt the devsecops model will outperform their competitors that don’t.

The impact of DevOps on your bottom line

The impact of DevOps on your bottom line

DevOps is the most important innovation to the IT sector since the invention of the personal computer. During Cybersecurity Awareness Month and beyond, DevOps is a philosophy to which security practitioners should pay attention.

Network defender innovation: time to throw out the old best practices

Network defender innovation: time to throw out the old best practices

We have reached a tipping point, a point in our community’s evolution where the security vendor mambo is no longer sustainable.

Cybersecurity spend: ROI Is the wrong metric

Cybersecurity spend: ROI Is the wrong metric

Think about what your network defenders do throughout the day, every day, in the course of getting their jobs done. Can you describe it in one sentence? How would you characterize the thousands of tasks that the InfoSec team fields...

Top Blog Posts