Jack Danahy Shares Insight on Endpoint Protection and Simplifying Cybersecurity
Inner Circle Podcast Episode 026 This week I am joined on the Inner Circle podcast by Jack Danahy, Senior Vice President of Security for Alert Logic. As most of you know, I also work for Alert Logic by...
View ArticleGreater Transparency Leads to Better Cybersecurity
The threat landscape is constantly evolving, and organizations of all sizes are essentially under siege. Effective cybersecurity is essential but evaluating and selecting cybersecurity solutions is...
View ArticleJamil Jaffer Chats about the Value of Sharing Threat Intelligence for Better...
Inner Circle Podcast Episode 030 My guest for this episode of the Inner Circle podcast is Jamil Jaffer, Vice President for Strategy & Business Development at IronNet Cybersecurity. We discuss a...
View ArticleSurvey Finds Many SOCs are Set Up to Fail
Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals...
View ArticleProtecting the ‘Crown Jewels’ with Threat Hunting
Qualys is a sponsor of TechSpective Cyber attacks target vulnerabilities. That is a simple, common sense reality that shouldn’t need to be pointed out. However, organizations often struggle to patch...
View ArticleImproving and Automating Threat Intelligence for Better Cybersecurity
Devo is a sponsor of TechSpective Cybersecurity is challenging. It is a daunting exercise to protect a complex hybrid cloud infrastructure from a rapidly evolving and expanding threat landscape....
View ArticleMaggie MacAlpine Chats about Collaborative Threat Intel Initiative
TechSpective Podcast Episode 099 Do you like to do jigsaw puzzles? I generally don’t have the patience, but my wife is a jigsaw puzzle fanatic. Gathering threat intelligence is a lot like assembling...
View ArticleMark Thomas Talks about Threat Hunting
TechSpective Podcast Episode 101 There are many facets to cybersecurity. Organizations seek to prevent or block as much as possible, while also constantly monitoring their environments, and–in most...
View ArticleUsing Machine Learning to Help Detect Sensitive Information
By Wilson Tang, Machine Learning Engineer in Threat Hunting As a large, global organization with thousands of employees, Adobe creates and exchanges countless documents every day. These documents can...
View ArticleUsing LLMs to Automate and Streamline Cyber Threat Analysis
TechSpective Podcast Episode 122 There are a number of steps involved in cyber threat analysis to review event information and determine which events are benign or innocuous and which are...
View Article
More Pages to Explore .....