Featured
Fix it! NO, not like THAT
Security pros often don’t understand why their business won’t accept certain types of solutions. Thus, they can’t articulate those problems to vendors. If both sides can't grasp why existing solutions aren’t organizationally viable, they stand no chance at building better solutions that are viable.
Identity Is the Perimeter. Attackers Know It. Do You?
Dave Lewis, Global Advisory CISO at 1Password, says if you treat identity as your perimeter, you stop caring about where traffic comes from and start caring about who is asking for access, how they proved it, and what they are allowed to do. Here's how to go about it.
CYBR.HAK.CAST Episode 13: Winn Schwartau
Winn Schwartau argues that the biggest threat facing defenders isn’t just technical, but cognitive: overwhelming information flows that push humans into “mental DDoS.” He has introduced the concept of “critical ignoring” as a prerequisite to critical thinking.
CYBR.HAK.CAST Episode 12: Fergus Hay of The Hacking Games
Phil Wylie and Michael Farnum talk with Fergus Hay about how the cybersecurity industry is missing a huge opportunity by overlooking gamers and young, neurodiverse problem-solvers who already have the mindset to become the next generation of ethical hackers.
CYBR.SEC.CAST Episode 66: Wendy Nather
In CYBR.SEC.CAST Episode 66, Wendy Nather explains why cybersecurity’s biggest lessons aren’t coming from breaches, but from the near-misses no one talks about.
CYBR.HAK.CAST Episode 11: Theresa Lanowitz
As AI accelerates development and expands the attack surface, organizations are waking up to a harsh reality: the software supply chain is now their most fragile and least understood security risk.