The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.
Cybersecurity
In the latest Cybersecurity Minute, Ep. 20, Chris summarizes the White House’s latest move to curb cyberattacks with greater collaboration.
As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.
The way that data and collaboration tools, cross-team engagement, and SOAR tools are improving is expanding the how and where that the SOC can add value to an organization.
With a rapidly evolving threat landscape and higher customer expectations, Security Operations Center’s next steps must involve a new path with modern technologies.
In this Cybersecurity Minute, Ep. 19, Chris analyzes the CNCF releasing its Secure Software Factory guidance and what it means for software security.
The high-level fundamentals are a good starting point for organizations to reduce their vulnerabilities, writes Chris Hughes.
As the Metaverse becomes more ingrained into the worldwide economy, its data will become a valuable attack target. Here’s how to protect it.
Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.
As Chris Hughes explains in Ep. 18 of Cybersecurity Minute, Atlassian’s notification to the public of these vulnerabilities allowed companies to put mitigating controls in place until the patch was released.
Though it’s primarily for the EU, the sweeping privacy regulation will have a lasting impact outside of Europe in regulating data privacy.
In Cybersecurity Minute, Ep. 17, Chris recaps the highlights from the annual report including rises in ransomware and supply chain security attacks.
In Cybersecurity Minute, Ep 16, Chris provides an update on the 2015 Office of Personnel and Management data breach and subsequent settlement for 22 million users.
In the Data Revolution podcast premiere episode, Pablo hosts CEO Joseph Derflinger and CTO See Wan Toong to discuss their studio’s new game ‘Reign of Terror.’
Finding cyber talent is challenging enough, but the public sector’s national security and social services concerns make the hunt even harder.
In this Cybersecurity Minute, Chris analyzes how the digital infrastructure of Costa Rica is falling prey to cyber crime.
Although there are differences between the private and public sectors, there is also more overlap than we hear from social media conjecture.
From supply chain software to workforce changes, future cybersecurity trends require closer looks by companies looking to make their systems more resilient.
While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.
Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.



















