Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama Apr 29Data Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
Alissa KnightFeb 6, 2019ATT&CK Model: It ain't your mama's kill chainWho and what is MITRE MITRE is a non-profit whose mission is to solve problems for a safer world through federally funded research and...
A. KinghtJan 29, 2019Building the New Zero Trust EnterpriseWhat Zero Trust Is It was 2010 when John Kindervag, then an analyst with Forrester Research first wrote about the idea of a zero trust...
A. KinghtJan 9, 2019The CRO-CISO Waltz: The adjoining of cybersecurity and risk management in financial institutionsThe increasingly complex regulatory environment, along with ongoing technological gains largely propelled by the new emerging industry of...
A. KinghtDec 5, 2018The New Face of Frictionless Identity Access ManagementFirst, there were just usernames. Then came usernames and passwords. Then came multi-factor authentication (MFA), which requires...
A. KinghtOct 30, 2018The Bug Bounty Hunter and The New Zero-Day Exploit EconomyHistory Bugs, also referred to as vulnerabilities in software, are flaws that can be abused to cause unintended behaviors in the system...
A. KinghtOct 18, 2018Are We Secure Yet? Redefining What It Means To Be Secure Against Cybersecurity ThreatsOver the last eighteen years I've seen a lot of board rooms. Meeting with Boards of Directors for companies with as few as one hundred...