Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Cybersecurity Risk Must Shift to ‘Secure by Default’ Principles
Cybersecurity Minute

Why Cybersecurity Risk Must Shift to ‘Secure by Default’ Principles

Chris HughesBy Chris HughesApril 28, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 83 of the Cybersecurity Minute, Chris Hughes takes a look at a new guide out from CISA (Cybersecurity and Infrastructure Agency) that aims to strengthen cybersecurity.

To hear practitioner and platform insights on how solutions such as ChatGPT will impact the future of work, customer experience, data strategy, and cybersecurity, make sure to register for your on-demand pass to Acceleration Economy’s Generative AI Digital Summit.

Highlights

00:43 — There’s a new CISA publication, Shifting the Balance of Cybersecurity Risk. It’s part of the conversation about rebalancing the responsibility to defend cyberspace. The aim is to empower those most capable to be better stewards of our digital ecosystem.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

01:38 — Right now, the scenario is that risk is passed down to the consumer whether it be everyday citizens who have no real competencies in cybersecurity or small to mid-sized businesses with limited resources.

02:03 — CISA’s publication focuses on two things: “secure by design” and “secure by default.” “Secure by design” refers to systems or products that prioritize security as a critical consideration alongside customer and business goals. “Secure by default,” on the other hand, refers to those that are inherently secure when taken out of the box.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

03:08 —The CISA publication does not impose any requirements or regulations. Some are calling for federal regulations to be put in place, such as those seen in states like New York and California. However, having regulations in individual states creates a patchwork framework with many different cybersecurity requirements across the country, burdening businesses.

03:42 — There’s a similar problem in the privacy landscape. States are tackling the issue since the federal government hasn’t quite stepped in yet and put forward a federal privacy framework that’s been required.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

CISO CXO Cybersecurity Cybersecurity Minute data privacy framework risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025

Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

June 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.