From the Winter 2023 Issue

Open Source Software Supply Chain Security

Author(s):

Prabhat Pokharel, CEO, Biz Serve IT

OSS Supply Chain Security

As the world moves toward a digital future, so does the competition and pace of the software development environment. It is causing companies to adopt practices that reduce costs and increase the speed of their software development supply chain while gaining a competitive advantage. An effective software supply chain includes planning, procuring, developing, and deploying … Read more

From the Winter 2023 Issue

Critical Solutions for Enhanced Cybersecurity and Digital Transformation

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Digital transformation is a key component of the modern business landscape. And, with the expansion and prevalence of digital devices, networks and systems — comes an ever-greater risk of cybersecurity threats that could potentially create major disruptions or downsides. This emphasizes that organizations must strategically address cybersecurity in their digital transformations, to ensure the successful … Read more

From the Winter 2023 Issue

What Now? Updates on Recruiting Cybersecurity Professionals

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

What Now Recruiting

In Fall 2015, we discussed cybersecurity recruiting and the focus was on recruiting more veterans into cybersecurity positions to provide diversity, leadership and an already experienced, trained workforce to fill the thousands of job vacancies. While more recruiting of veterans in cybersecurity is still highly advocated, the overall landscape for cybersecurity recruiting has drastically changed … Read more

From the Winter 2023 Issue

Managing Security “In” and “Of” the Cloud

Author(s):

Daniel Deeney, Co-Founder & CEO, Paladin Cloud

Many digital transformation initiatives today involve a strategic move to the cloud to capture the key benefits of scalability, flexibility, and reduced cost for the modern enterprise. However, a new security paradigm is emerging in the cloud where enterprises lack visibility into applications and data, struggle to identify and secure cloud assets, and grapple with … Read more

From the Winter 2023 Issue

Understanding New Cybersecurity Risks in Cloud Computing

Author(s):

Michael Silbernagel, Senior Security Analyst, SysGen

New Risks in Cloud Computing

Cybersecurity is quickly becoming a prioritized concern for businesses. Cybersecurity impacts business daily in the form of access, availability, and integrity of data but also affects businesses’ long-term credibility and reputation. Engaging in solid cybersecurity practices is urgent as new threats and knowledge come to light daily. The future of business in the digital age … Read more

From the Winter 2023 Issue

CISOs: Top 5 Strategies to Get Ready for the Quantum Threat

Author(s):

Skip Sanzeri, FOUNDER and COO, QuSecure, Inc.

Quantum Threats

Quantum computers are very powerful machines that utilize subatomic properties offering humanity an amazing advancement to solve many unsolvable problems. Unfortunately, quantum computers are very good at breaking the existing cybersecurity the world uses today. In short, quantum computers will threaten our data and privacy to the extent that this will force the largest technology … Read more

From the Winter 2023 Issue

When It Comes To SAP, Don’t Be A “SOAR” Loser

Author(s):

Christoph Nagy, CEO, SecurityBridge

SAP - SOAR

Irrespective of whether you are starting your career in information security or have years of experience in this field, you might realize that you are part of an unfair game. Why is that? An army of attackers composed of kids, organized crime, and nation-state hackers are coming after your information. However, most companies need more … Read more

From the Winter 2023 Issue

Level-up API Protection with Identity and Centralized Trust

Author(s):

Gary Archer, Product Marketing Engineer, Curity

Level-up-API

Introduction API security has matured over the years, and the best practice has moved away from older security methods such as API keys. Token-based authentication is the norm, but too often, a significant concern is overlooked: identity. An identity focus is critical for modern APIs to mitigate risk and prevent cyber-attacks. In this article, we … Read more

From the Winter 2023 Issue

How K-12 Schools Can Confidently Protect Digital Identities

Author(s):

Michael Webb, Chief Technology Officer, Identity Automation

K-12 Schools Digital Identities

Data heavy and often highly vulnerable, the K-12 education sector provides a broad surface area for exploitation by sophisticated and novice hackers alike. Increasingly targeting all varieties of schools – large and small, urban and rural, public and private, cybercriminals seek out fast financial gain by gaining access to the highly sensitive personal data of … Read more

From the Winter 2023 Issue

The New Threat Surface: Employee-Targeted Digital Risks

Author(s):

Amir Tarighat, Co-Founder and CEO, Agency

The New Threat Surface

In the last decade, the enterprise cybersecurity ecosystem has rapidly grown to address new threats. Overall, it has become highly effective. Businesses have benefited from a veritable army of professionals and cutting-edge technology to secure their systems, forcing bad actors to evolve their strategies. As corporate devices and networks are increasingly well-hardened, cybercriminals have begun … Read more