Securiosity: What happened with the Vault 7 trial?

Greg Otto and Jeff Stone talk about the how the case against Joshua Schulte ended in a mistrial.

CyberScoop Radio

The case for transitioning to a single, multi-cloud IAM platform

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

SAIC Cybersecurity Director Eric Brown talks with Axiad co-founder Bassam Al-Khalidi about the rationale for moving to a single identity and access management platform.

Cyber Everywhere: The growing threat of mis-, dis-, and malinformation

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

Deloitte cybersecurity leaders discuss the risks posed by MDM and share strategies to help combat these threats, often taking advantage of existing infrastructure and processes.

Practical strategies to establish a zero-trust security environment

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

Splunk security strategist James Young highlights lessons learned embracing zero-trust practices internally and what agencies can learn from the experience.

Well-funded, organized attacks require strategic counter-defense strategies

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.

How zero trust helped insulate Splunk from supply chain attack

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.

Defenders need to increasingly rely on agility in cyberspace

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

Recent events of 2020 have taught CISOs important lessons defending against agile cyber-adversaries building and executing cyberattacks.

Threat intelligence increasingly depends on AI

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

But artificial intelligence still requires time to learn as adversaries grow in size and sophistication, a security expert says.

Securiosity: How is information being shared during the pandemic?

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

Greg Otto talks to Dan Young, Founder of QuoLab, about what he’s doing to help keep the lines of information sharing open

Cyber Everywhere: Aligning the CISO role with the business strategy

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

The roles of chief information security officers are changing as organizations establish a broader security strategy into their lines of business.

Securiosity: How important is API security?

by <a href="https://www.cyberscoop.com/author/cyberscoop-staff/" title="Posts by CyberScoop Staff" class="author url fn" rel="author">CyberScoop Staff</a>

Everyone loves APIs. Including hackers.

TwitterFacebookLinkedInRedditGmail