In this Cybersecurity Minute, Aaron looks at Oracle Cloud’s new security features and the use of machine learning in cloud data threat assessment.
Okera’s Bobby Napiltonia and Nong Li join Acceleration Economy analysts Wayne Sadin and Aaron Back to discuss data stewardship in a time of expanding regulations and compliance requirements.
As supply chain complexity has exploded, CISOs need to map out the risk management strategies for their organizations.
From military submarines to astronomers charting the night sky, remote access is everywhere & poses a serious threat if left without security.
At Cloud Wars Expo, cybersecurity specialist and analyst Chris Hughes will speak on multi-cloud threat management.
In this Cybersecurity Minute, Chris talks about efforts being made to improve open-source software security by OpenSSF.
While secrets management has been a challenge, it’s critical that organizations have a game plan for when a credential leak occurs.
Shortly on the heels of the Log4j is a new exploit in the Spring Framework, Spring4Shell. Here we explore what it is and how to mitigate it.
Although some may think that robots are going to replace humans, there are many beneficial aspects of using AI as an assistant.
As the future is certainly digital, organizations need to ensure they are able to manage digital risk and growth.
In this Cybersecurity Minute, Chris talks about NIST’s updated C-SCRM Guidance based on tasking from the Cyber Executive Order from the President.
As containers are changing the tech landscape, business leaders need to understand containerized applications, orchestration, and security.
In today’s digitally-driven world, fostering cyber resilience in global, digital ecosystems is critical to ensure secure innovation.
In this Back @ IT episode, Aaron hosts a conversation with Robert Wood to discuss how a cybersecurity framework can add value.
As there is much excitement about the emerging virtual world, many still can’t help but question the level of security in the Metaverse.
In this Data Revolution Minute, Pablo answers the frequently asked question: Is data stored in the cloud really secure?
Security teams should consider these key questions when evaluating identity and access management (IAM) tools.
Multi-cloud services are often associated with their own identities, permissions, authentication, and authorization activities.
In this Cybersecurity Minute, Chris discusses action being taken by the SEC to ensure cybersecurity expertise at the board level.
Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.



















