Threat Landscape
Hacker's Almanac
July 22 by Seth AdlerThis guide serves as a cornerstone for understanding: The current threat landscape; Why your organization is at risk; How to determine your distributed attack surface; How attackers are targeting your...
The Inevitability Of Being Compromised
June 10 by Seth AdlerEspecially with the adoption of a cloud-first mindset, the challenge most companies now face is failing to understand their entire attack surface. This challenge has metastasized. Permissions granted...
2021 Threat Intelligence Top Actions
January 12 by Seth AdlerOn the eve of 2021, the SolarWinds attack took place. CISO minds will be focused all year long on the fallout. But it is clear now that the human intelligence about threat intelligence from the global...
What CISO's Need To Know About Risk Based Cyber Security
December 03 by Seth AdlerCyber Security Hub recently asked the community "What is the last thing to do in 2020?" Not surprisingly, a consistent response was manage risk. Both taking inventory of risk and budgeting or insuring...
Threat Landscaping
October 27 by Seth AdlerThreat intelligence is one of those posture-forward initiatives. Our upcoming Year-End Report will shed light on the fact that it is a growing focus for the community. In concert with that growing foc...
Strategic, Operational and Tactical Assessments Of The Moment
September 30 by Seth AdlerThreat activity has changed. Adversary tactics, techniques and procedures (TTPs) have matured. As the landscape evolves, CISOs must act swiftly and decisively to secure the enterprise by better realiz...
New Threats On An Evolving Threat Landscape
September 24 by Seth AdlerSecurity threats abound yet are distinct and evolving as we make our way to 2021. While this week's TF7 episode asks about the viability of yet another threat.
5 Key Takeaways On Cyber AI from The CSHub Financial Services Summit
September 23 by Seth AdlerTakeaways include How digital acceleration & global disruption shape today’s threat landscape; Security challenges such as insider threat, IP theft, data breaches, and compliance and regulation; How a...
The Future of Forensics on AI Systems
June 25 by Seth AdlerYonts suggests that the defining moments of a CISOs career are breaches. Applying lessons learned during breaches ensure that your enterprise is protected from the known and has the potential to prepa...
Always Be Testing, Always Be Assessing, Always Be Prepared
June 16 by Seth AdlerKey session at Cyber Security APAC July 14-15 outlines how you can ensure confidence in your controls, processes, technology and talent. You only know what you know and having a good picture of the th...
Address The New Threat Vectors On Your New Landscape
June 09 by Seth AdlerJamal Hartenstein has worked with the department of defense, as a part of joint task forces and has experience with every branch of service. He’s helped with cyber security and data privacy initiative...
Risk Management At The Forefront Of Tech Enterprises
April 30 by Alarice RajagopalDan Heywood looks at cyber security risk management as an integral part of his role within Virgin Mobile UAE, as they look to make the transition from “old school" telco to an all-digital offering.