Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.
breach
Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.
Digital transformation has brought on a new level of cybersecurity concerns around applications, and those need and those concerns warrant CEO focus, Tony Uphoff says.
Do you know how to respond after a security breach has happened? This “for CISO, by CISO” guidebook provides first-person actionable insights from practitioners.
In ep. 33 of the Cybersecurity Minute, Frank Domizio explains how organizations have “tabletop training” for incident response in the event of a power outage or ransomware attack.
In this Cloud Wars Horizon Demo Day moment, John Siefert is joined by Aaron Back and Chris Hughes to discuss how businesses must prepare for inevitable data breaches.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
In Ep. 6 of the Acceleration Economy Minute, Kieron Allen explains why legal representation is needed for those who wish to succeed in the acceleration economy.
CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.
Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.
In this Cybersecurity Minute, Chris covers another breach with Okta, as the SaaS provider has recently fallen victim to Lapsus.