The Imperative for Modern Security: Risk-Based Vulnerability Management - By prioritizing vulnerabilities based on risk and aligning security efforts with business objectives, organizations can enhance their resilience to cyberattacks, optimize resource allocation, and maintain a proactive security posture. (Torsten George)
Artificial Arms Race - What Can Automation and AI do to Advance Red Teams - The best Red Team engagements are a balanced mix of technology, tools and human operators. (Tom Eston)
From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements - Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands. (Marc Solomon)
Diversifying Defenses: FjordPhantom Malware Shows Importance of a Multi-Pronged Approach - Security teams need to combine the angles of client-side and server-side detection in order to have the best chance of mitigating the risk of advanced mobile malware. (Joshua Goldfarb) |