THOUGHTS FROM OUR CISO ADVISORY BOARD
Swiping Right on Cybersecurity: Considerations for Picking the Right Security Platform for You
By Sara Griffith Selecting the right cybersecurity platform is more than just a technical decision. It’s a strategic one that will impact your organization’s overall resilience against threats. This choice demands a nuanced understanding...
Reflecting on the Single Pane of Glass: The Challenges of Hybrid Environments
By Michelle Wilson There’s been a seismic shift in security needs driven by the rapid adoption of cloud technologies. The allure of scalability, flexibility, and cost-efficiency has propelled organizations to embrace hybrid environments....
Linux is Having an Identity [Access] Crisis: The Quest for Standardization
By Awwab Arif Linux, renowned for its extensibility and customization, stands tall in the world of operating systems. Yet, organizations are plagued with administrative overhead in areas like system administration, Single Sign-On (SSO),...
Runtime Security and the Ramifications of Container Contamination
By Julie Chickillo With 96% of organizations actively using containers and Kubernetes1, containers have swiftly emerged as the standard method for deploying compute workloads in the cloud-native environment. This proliferation makes...
What Keeps Me Up at Night as a CISO
By Sue Lapierre As a Chief Information Security Officer, the notion that perpetually haunts me is not necessarily if my organization will face modern cyber threats, but how well-prepared we are to respond to them. AI looms as a...
What does an Ideal Patching Strategy for Linux look like?
by Rob Dalzell Securing your Linux system requires a proactive approach to patch management. For those unfamiliar with the term, patch management is the systematic process of keeping computer systems and software updated with the latest...
Why ESXi Protection is So Difficult
by Brett Cumming VMware's ESXi platform has been a cornerstone of many organizations’ virtualization strategy for years and is relied on for reliably hosting business critical services. The combination of widespread adoption and business...
Securing Linux with AI: Revolutionizing Zero Trust Security
by Dan Sheehan Within the continually evolving realm of cybersecurity, the Zero Trust model has emerged as a paramount strategy. This approach operates on a simple yet fundamental principle: "Never trust, always verify." However,...