security
How to Make Your Threat-Hunting Program More Effective
As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program ...
Security Boulevard
Understanding The FTC Safeguards Rule
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ensure the protection ...
The Urgency for Robust Utility Cybersecurity
Nik Hewitt | | advice, analysis, application protection, applications, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
The need for improved utility cybersecurity has never been more critical The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As ...
Bridging the Gap as OT Networks Integrate with IT Environments
As OT networks integrate with IT environments, how can we bridge the gap to promote robust security? The (sometimes intricate) lines between Operational Technology (OT) networks and Information Technology (IT) environments are ...
Educating the Next Cybersecurity Generation with Tib3rius
Tom Eston | | Application Security, AppSec, Bug Bounties, bug bounty, Burp Suite, career, Content Creation, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, penetration tester, Penetration Testing, pentesting, Podcast, Podcasts, Privacy, security, TCM Security, technology, Tib3rius, training, Veracode, Web App Hacking, Web Application Hacking, web applications, Web Apps, Weekly Edition
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Crowdsourced Security-as-a-Service
TechSpective Podcast Episode 119 If you want to prevent threat actors from infiltrating or compromising your environment, it helps to see things from the threat actor perspective. This concept has been ...
Managing a World-Class Security Program in a Recession
James Christiansen | | CISO leadership, cost management, economic, employee security, risk management, security
As signs of a global recession continue to pile up, many businesses are tightening their spending across the board. Though cybersecurity remains a critical concern for virtually every type of organization, even ...
Security Boulevard
FIM Beyond Breaches: Compliance and Trust
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, File Integrity Monitoring, FIM, next gen security, security, Security Research
More than just breach mitigation – File integrity monitoring (FIM) is trust and compliance Every day, we see an ever-escalating array of cyber threats. As organizations race to safeguard their digital assets, ...
Your Codebase is a Cluttered Garage Full of Dead Code
Over time unused code becomes clutter as teams refactor. Shouldn't Java developers have an easier way to identify dead code for removal? The post Your Codebase is a Cluttered Garage Full of ...
The Evolving Work of the CISO in 2024
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
The challenges, responsibilities, and the modern cybersecurity battlefield for CISOs in 2024 I speak to many cybersecurity professionals, and if there’s one ongoing and pervasive concern they all highlight about the nature ...