Bill reconnects with Sonatype Co-founder Brian Fox to find out why it’s taken so long for organizations to respond to the Log4j vulnerability, which was first discovered a year ago.
The public sector has a reputation for moving slowly and inefficiently, but when it comes to cybersecurity, it may be the place for private sector businesses to watch and learn.
Bill summarizes the main points from Endor’s 2022 State of Dependency Management study to better understand how cybersecurity professionals should respond to OSS vulnerabilities.
John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss the latest Q3 Cloud Wars Top 10 earnings results, which are nuanced once looked at through the lens of technology and digital transformation.
Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.
While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.
In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.
After a breach, you’ll want to stop data loss as soon as possible, but it comes with risks and other drawbacks. Frank shares tips to arm you with the knowledge, options, and flexibility to advise your business on the right approach.
Burned out security and software teams are hard to retain and increase the odds of a breach. Bill speaks with Object First’s David Bennett, about how he tackles the issue as an object storage solution startup CEO.
Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.
Cropin, Couchbase, HYCU, and other Cloud Wars Horizon companies gain new visibility at the AWS re:Invent conference.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
In Ep. 6 of the Acceleration Economy Minute, Kieron Allen explains why legal representation is needed for those who wish to succeed in the acceleration economy.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.
By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.
Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.
In Ep. 26 of the Growth Swarm podcast, John, Bob, Scott, and Tony discuss reasons behind today’s economic uncertainty, and why the cloud offers extraordinary alternatives for businesses to create their own futures.