security (135)


I had a great time talking with Mark Fletcher in the Cyber Security Sauna podcast, talking about why Value is the blind spot of cybersecurity and how we should maximize it!
 
Fun fact: we recorded this podcast in an actual sauna recording booth at SPHE

Read more…

Firmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers.   In today’s Cybersecurity Insights podcast, I am talking with Scott Scheferma

Read more…

I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is being applied. Sharing a replay of the presentation where I discuss cybersecurity history, root causes, shifting

Read more…

Recently introduced Ransomware and Financial Stability Act (H.R.5936) is the right direction for undermining ransomware attacks, by disallowing payments, but it just does not go far enough. This proposal only benefits traditional financial institutio

Read more…

One of the greatest challenges for a cybersecurity leader is to convey the present digital risks upward to the c-suite and Board of Directors. Representing to executive leadership the value of security, which protects the organization’s assets, reput

Read more…


The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. The “Closing the Cyber Skills Gap” panel feat

Read more…
Will slapping a cybersecurity label on IoT devices, like nutrition label on foods, result in better overall protection and consumer decisions? Although sharing risk data with purchasers sounds like a good idea, there are challenges. The U.S. is f
Read more…

Once an abstract and futuristic concept, the cloud has now extended its very tangible tendrils into nearly all aspects of the modern enterprise. In fact, the abundance of cloud options that organizations enjoy today has become somewhat of a liability

Read more…
Cybersecurity has evolved with the rapid rise of digital transformation, becoming a crucial element of trust for products and services.  No longer just a function of preventing impacts and meeting regulatory requirements, cybersecurity is emerging as
Read more…

 

Static Application Security Testing (SAST)

SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.

 

Pros

• SAST can pin point the code where

Read more…

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)