News
Security teams can analyze live network traffic, an approach also known as network detection and response, and be more proactive in detecting the warning signs of an impending breach.
Long lists of firewall rules can lead to misaligned and inconsistent policies, creating gaps in your security perimeter for threat actors to exploit.
This critical shift of social media apps becoming “mission-critical” everything apps requires a different approach when it comes to resiliency.
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early ...
Can Streamlined Secrets Management Enhance Stability? Secrets management can be likened to a well-kept vault of confidential data, critical to the security and performance of any system. Where data ...
Are Your Investments in Cloud-Native NHIs Justified? A new hero has emerged, capable of handling complex security threats to cloud. Meet Non-Human Identities (NHIs), the machine identities that have ...
Has the notorious LockBit ransomware gang finally met its end? In a shocking turn of events, LockBit, one of the most notorious ransomware groups, has had its own site defaced and a massive amount of ...
Most governments struggle with replacing legacy systems for a variety of reasons. But some people claim legacy mainframes can be just as secure as modern ones. So how big is the legacy cyber threat?
Opinion
MY TAKE: Beyond agentic AI mediocrity — the real disruption is empowering the disenfranchisedIs agentic AI accelerating mediocrity? Plenty of folks on LinkedIn seem to think so. Related: The 400th journalist A growing chorus of academics, tech workers, and digital culture watchers are ...
RSAC 2025 revealed that AI agents are reshaping trust and identity. Learn what top CISOs are doing about it and how the ...
President Trump wants to cut CISA's budget by $491 million, or 17%, to refocus it on its "core mission" and end what he said ...
Is Your Organization Optimally Protecting Its Non-Human Identities? I bring this pertinent issue to light. Non-Human Identities (NHIs) and Secrets Security Management are essential components in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results