Securiosity: What happened with the Vault 7 trial?

Greg Otto and Jeff Stone talk about the how the case against Joshua Schulte ended in a mistrial.

CyberScoop Radio

The case for transitioning to a single, multi-cloud IAM platform

by • 2 months ago

SAIC Cybersecurity Director Eric Brown talks with Axiad co-founder Bassam Al-Khalidi about the rationale for moving to a single identity and access management platform.

Cyber Everywhere: The growing threat of mis-, dis-, and malinformation

by • 4 months ago

Deloitte cybersecurity leaders discuss the risks posed by MDM and share strategies to help combat these threats, often taking advantage of existing infrastructure and processes.

Practical strategies to establish a zero-trust security environment

by • 6 months ago

Splunk security strategist James Young highlights lessons learned embracing zero-trust practices internally and what agencies can learn from the experience.

Well-funded, organized attacks require strategic counter-defense strategies

by • 6 months ago

This year’s high-profile supply chain attacks underscore the gravity of lateral threats. Splunk’s Yassir Abousselham says zero trust and SOC modernization strategies are key.

How zero trust helped insulate Splunk from supply chain attack

by • 7 months ago

The pervasive attack on government and commercial IT systems, via SolarWinds, highlighted the need for zero trust — and powerful analytics tools.

Defenders need to increasingly rely on agility in cyberspace

by • 12 months ago

Recent events of 2020 have taught CISOs important lessons defending against agile cyber-adversaries building and executing cyberattacks.

Threat intelligence increasingly depends on AI

by • 1 year ago

But artificial intelligence still requires time to learn as adversaries grow in size and sophistication, a security expert says.

Securiosity: How is information being shared during the pandemic?

by • 1 year ago

Greg Otto talks to Dan Young, Founder of QuoLab, about what he’s doing to help keep the lines of information sharing open

Cyber Everywhere: Aligning the CISO role with the business strategy

by • 1 year ago

The roles of chief information security officers are changing as organizations establish a broader security strategy into their lines of business.

Securiosity: How important is API security?

by • 1 year ago

Everyone loves APIs. Including hackers.

TwitterFacebookLinkedInRedditGmail