Picture this: An object storage misconfiguration has left thousands of customer records fully exposed. Your company is about to face costly compliance consequences and a loss of customer trust. How should you respond? More importantly, how could a secure hybrid cloud strategy have helped prevent such an incident from happening…
Read More
No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when. While the literature generally focuses on the different uses of AI by attackers and defenders — and the resultant arms race between the two — I want to talk about…
Read More
In an effort to raise cybersecurity awareness and help both school districts and teachers develop security-based curricula, the National Institute for Cybersecurity Education (NICE), part of the National Institute of Standards and Technology (NIST), hosted two consecutive conferences this fall. These back-to-back conferences brought experts from industry and academia together…
Read More
Your organization’s computer security incident response team (CSIRT) plays a crucial role in coordinating the incident response process for security events that affect the company’s infrastructure, data or users. But to whom do you turn in case of incidents or vulnerabilities related to the products you build? A product security…
Read More