SECURITY
XAM
The risks of end of life software and how to address them
The thing about nostalgia is that it conveniently omits all the past’s imperfections.
Continue readingThe thing about nostalgia is that it conveniently omits all the past’s imperfections.
Continue readingWhen you tell people you’re writing a piece on cybersecurity insurance, they tend to look at you with a mix of confusion and pity.
Continue readingThe Access-Trust Gap refers to the security risks posed by unfederated identities, unmanaged devices, applications, and AI-powered tools accessing company data without proper governance controls. This blog defines the gap, explains why it exists and why it poses a threat to security, and outlines various approaches security and IT leaders can take …
Continue readingWhat happens when the FBI gets a backdoor into an encrypted platform?
Continue readingAny security professional will tell you there’s a simple way to keep data secure: encase it in concrete and toss it in the ocean.
Continue readingZero Trust is having a bit of a moment.
Continue reading