Features
March 2023
Grace Hopper: The Woman Who Changed How We Code and Test
Dave Cartwright, CISSP | 8th March 2023
On International Women’s Day, we look back at the legacy of Rear Admiral Grace Hopper, an innovator and trailblazer in software development and standards for testing computer systems and components.
The Top Five Most Fun Cybersecurity Mistakes in TV And Movies
Dave Cartwright, CISSP | 3rd March 2023
The mysterious world of cybersecurity can sometimes be wildly misrepresented on-screen, causing challenges for professionals charged with educating colleagues and other users.
February 2023
Software Supply Chain Attacks are Escalating. Is The Industry’s Response Escalating Too?
Joe Fay | 7th February 2023
Software supply chain attacks over the holidays have once again left developers picking up the pieces in January. So how can the industry finally turn the tide?
Home Working Cyber Security
Dave Cartwright, CISSP | 7th February 2023
While home and remote working is accepted as a regular practice, the speed at which society has embraced it creates numerous security challenges, even after the experience of COVID-19 and rapid adoption.
SMB Cybersecurity: Why Buying Another Security Product is Not The Answer
John E. Dunn | 6th February 2023
Identifying SMB cybersecurity weaknesses turns out to be easier than having the know-how to fix them. Can a new class of advice software plug the gap?
Ransomware: Pay Attention to These Webinars So You Don’t Have to Pay Off The Criminals
Joe Fay | 6th February 2022
Ransomware is the number one cyberthreat organizations today…so get prepared to fight back with five webinars that can give you a technical and competitive advantage.
December 2022
Revving Up DevSecOps
Matt Gillespie | 12th December 2022
How security can assist developers calling the shots in today’s fast-shifting environments.
All in the Numbers
Harish Sureddy, CISSP | 12th December 2022
Whether operating as a SaaS-based, on-premises or cloud-based solution, the assets within data analytics platforms need to be protected.
Beyond the Bounty
Kownack, Artzi & Manrod, CISSP, CISSP | 12th December 2022
How to improve responsible disclosure using smart contracts and other Web3 technologies.
October 2022
Doxxing: It’s way more than public disclosures
Mick Brady | 10th October 2022
The act of doxxing is a mainstream attack vector, but there’s much more to it than just public disclosure of information.
Seeing is Disbelieving
Pat Rarus | 10th October 2022
A deep dive into the impact of deepfakes on today’s cybersecurity sector.
Assessing Critical Infrastructure
Éder de Mattos, CISSP-ISSAP, ISSMP, CISSP, CCSP | 10th October 2022
Never phone it in when it comes to making telecommunications systems more resilient to attacks.
IT/OT Convergence
Julien Legrand, CISSP | 10th October 2022
Disruptions and a dire prediction should have all of us carefully considering the cybersecurity implications of an IT/OT convergence.