The Willy Wonka World of Application Security Defenses
One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of ...
Read MoreSign up to receive the latest security news and trends straight to your inbox from Trustwave.
One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of ...
Read MoreDevelopers and cybersecurity have an interesting relationship. Developers have no problem with ...
Read MoreOnce an attacker enters your network, one of their first actions will be to try and hide their ...
Read MoreThe introduction, adoption, and quick evolution of generative AI has raised multiple questions ...
Read MoreMost homeowners know that a lock is a good idea as a basic defense against invaders, and leaving ...
Read MoreIf you've been following along with David's posts, you'll have noticed a structure to the topics: ...
Read MoreBuilding an effective Security Operations framework that provides the right balance of people, ...
Read MoreThreat Intelligence, or just TI, is sometimes criticized for possibly being inaccurate or outdated. ...
Read MoreIt’s impractical to operate security operations alone, using manual human processes. Finding ...
Read More(A thought from The Matrix: Neo likely used a SIEM before he took the red pill and could see the ...
Read MoreOver the years, several security defense architectures have merged into a single solution. Endpoint ...
Read MoreImagine being on shift as the guard of a fortress. Your job is to identify threats as they approach ...
Read MorePressure is increasing on manufacturers to monitor their shop floors for malicious activity to ...
Read MoreThis is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreKnow your enemy – inside and out. External Attack Surface Management tools are an effective way to ...
Read MoreThis is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreWe all know the cybersecurity industry loves its acronyms, but just because this fact is widely ...
Read MoreThis is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The ...
Read MoreThis is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts.
Read MoreAs anyone who has filled out an expense report can tell you, cost management is everyone's ...
Read MoreAt any point in your cloud security journey, you should consider practical architectures, ...
Read MoreI’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), and as a result, ...
Read More