Zero Trust and Third Party Risk
Navigating the Modern Security Data Landscape
A look at NIST's 800-204 "Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines"
Vulnerability Research & Management
Modern Cloud Security & Resilience
The Convergence of Technology and Digital Policy
A look at the CISA 2022 Top Routinely Exploited Vulnerabilities Report and how to protect yourself moving forward
Battlefield Cyber
The third iteration of the Exploit Prediction Scoring System helps security teams prioritize vulnerabilities through prediction.
Discussing the pendulum swing between OSS and proprietary code/software security concerns
A look at the recently published National Cybersecurity Strategy Implementation Plan (NCSIP)
Cyber from Sea to Space