In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
Lookout Principal Technical Marketing Manager Daniel Feller explains how behavior analytics is a foundational element of the Lookout Cloud Security Platform, which focuses on internet security, private apps, and SaaS apps.
In this Cloud Wars Horizon Demo Day moment, Chris Hughes discusses how Chainguard, Grip, and Endor Labs are addressing security issues in new ways.
In this Cloud Wars Horizon Demo Day moment, John Siefert is joined by Aaron Back and Chris Hughes to discuss how businesses must prepare for inevitable data breaches.
Cloud backups are one of the first use cases that the cloud was famed for, and they’re essential for restoring systems after a breach, as Kieron explains in episode 18.
In ep. 17, Kieron reviews Bill Doerrfeld’s recent report on workplace burnout among software development and cybersecurity teams.
This digital event delivers timely insight that business & technology leaders need to understand the how and why of sustainability’s impact on business processes & profits.
In ep. 53, Tony explains why the cloud, hyperautomation, data modernization, and cybersecurity are the enabling technologies companies will need to transform and modernize in 2023.
Bill reviews ThreatQuotient’s “2022 State of Cybersecurity Automation” report, which finds that the majority of organizations experience pain problems implementing these initiatives.
Is multi-cloud worth it? Bill Doerffeld lays out the pros and cons so you can determine whether or not to adopt it.
Bill reconnects with Sonatype Co-founder Brian Fox to find out why it’s taken so long for organizations to respond to the Log4j vulnerability, which was first discovered a year ago.
The public sector has a reputation for moving slowly and inefficiently, but when it comes to cybersecurity, it may be the place for private sector businesses to watch and learn.
Bill summarizes the main points from Endor’s 2022 State of Dependency Management study to better understand how cybersecurity professionals should respond to OSS vulnerabilities.
John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss the latest Q3 Cloud Wars Top 10 earnings results, which are nuanced once looked at through the lens of technology and digital transformation.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.
In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.
After a breach, you’ll want to stop data loss as soon as possible, but it comes with risks and other drawbacks. Frank shares tips to arm you with the knowledge, options, and flexibility to advise your business on the right approach.
Burned out security and software teams are hard to retain and increase the odds of a breach. Bill speaks with Object First’s David Bennett, about how he tackles the issue as an object storage solution startup CEO.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.