Doing Business with the NSA

Author(s):

Doing Business with the NSA

March 12, 2025 | 8:30 AM – 10:00 AM | Linthicum Heights, Maryland Brian Shay,Customer Outreach Advocate, Small Business Programs at National Security Agency (NSA) Brian Shay received his Bachelor’s Degree in Marketing from Marshall University, and his MBA from the Jack Welch Management Institute. Brian has 10 years of sales and management experience in the private industry … Read more

Cyber Pop-up Happy Hour

Author(s):

Cyber Pop-up Happy Hour

February 26, 2025 | 4:00 PM – 7:00 PM / EST  | Tysons, Virginia Calling all cybersecurity pros! Join us for a pop-up happy hour to connect with peers, share insights, and unwind after a long day. Drinks, appetizers, and great conversation guaranteed. Don’t miss this chance to expand your network and catch up with friends … Read more

Cyber Whistleblowing: What Employers Should Know

Author(s):

Frankie Wallace, ,

Cyber Whistleblowing

As businesses adopt emerging technologies like AI and VR, professional lives are growing more connected to the internet and, therefore, the world. While this can drastically improve efficiency and contribute to business growth, it has also led to a rise in cyber-attacks — and not just for tech companies. Cybercrime is affecting industries beyond tech, … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more

5 Common Cybersecurity/IT Mistakes in Your Small Business

Author(s):

Gloria Martinez, President, WomenLed

5-common-mistakes-martinez-

The world is filled with hackers and other criminals who hunt the web for unprotected small and medium-sized businesses.  Cybercriminals understand that many businesses are not equipped to manage a breach, leaving them more vulnerable to attacks and less likely to respond. But that doesn’t mean your company has to remain passive in the fight … Read more

The State of Server-Side Request Forgery Risks in 2022

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

server-side request forgery

Perhaps one of the best Black Hat talks in recent years was renowned web security researcher Orange Tsai’s presentation about bypassing Server-Side Request Forgery (SSRF) defenses. Together with his team, Tsai proposed a “very general attack approach” to discover numerous zero-days in built-in libraries of widely-used programming languages including Java, PHP, Python, Perl, JavaScript and … Read more

Why Data Protection Must Be a Part of Every Cybersecurity Strategy

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

Data Protection - Ahsan Siddigui

Widespread transition to remote/hybrid work creates vast opportunities for cyber attackers. With much more data being stored in the cloud and employees toiling away in less-secure home-office environments, ransomware attacks have skyrocketed. All told, ransomware struck 66% of midsize organizations in 2021, up from 37% the previous year according to the State of Ransomware 2022 … Read more

Application Security Should Be A Badge Of Honor, Not A Wall Of Shame

Author(s):

Mark Hamill, Director of Product Management, Cobalt

Application Security

Cybersecurity news is a curious thing.  For the most part it’s bad news.  Companies have been breached, risks are ever increasing and another billion-dollar crypto raid is under investigation.  Feels like we have enough to be worried about in 2022 without adding more. Application security is a category within a category and has been top … Read more

Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps

Author(s):

Jay Paz, Senior Director of Delivery, Cobalt

Engineering and Security

What happens when two distinct teams with varied technological expertise, different incentive structures and contrasting priorities converge?—the answer is usually tension. During a recent discussion with colleagues, a completely different result was experienced. ‘Camaraderie’ is the word that immediately comes to mind when thinking about the veteran DevSecOps/engineering and security leaders. Sure there are still … Read more

The Untold History of Women in Cybersecurity

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

The Untold History of Women in Cybersecurity

In the past, women’s role in the tech industry has been underrepresented, however, women have long been active in information security.  Their contributions are often overlooked and under-appreciated. Perhaps because women’s stories aren’t told as often as men.  Many cybersecurity professionals are unaware that women have been shaping and protecting our data for decades.  Despite … Read more