News

1. Vulnerability Management: Tips and Techniques – John Kellerhals – CSP #189 Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations ...
1. Dangerous books, Microsoft plus, NPD, Solar Winds, Jenkins, and more… – SWN #408 Dangerous books, Microsoft Plus, NPD, Solar Winds, Jenkins, and more, on this ...
1. Quantum AI Drones, Ransomhub, Pixel, Mad Liberator, the return of Russ Beauchemin… – SWN #407 Quantum AI Drones, Ransomhub, Pixel, Mad Liberator, the return of Russ Beauchemin, and More on ...
Stewart and Trey join us to talk about driving cybersecurity policies for the nation, what makes a good policy, what makes a bad policy, supply chain research and policies, and overall how we ...
The common crash report contains hidden information that could be golden for security professionals, according to security researcher and DoubleYou CEO Patrick Wardle, who took the stage at the ...
1. AI Red Teaming and AI Safety – Amanda Minnich – ESW #371 In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety?
Join us as we discuss how critically important it is for a CISO to establish, maintain, and frequently leverage in informal network. With almost daily changes in the threat landscape across all ...
The latest in-depth, unbiased news, analysis and perspective to keep cybersecurity professionals informed, educated and enlightened about the market.
David Redekop is the founder and CEO of ADAMnetworks. Leveraging over three decades of experience in the IT security industry he launched the company in 2013. ADAMnetworks specializes in DNS and ...
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News.
1. As We Implement Zero Trust, Let’s Not Forget About Metrics – George Finney – CSP #179 Many organizations are starting today down the Zero Trust path. Zero Trust is a strategy (vs an ...
The importance of CISO skills/metrics for the board, demonstrating the business value and necessity of good cybersecurity posture, as capabilities the CISO must master to be effective in securing ...