article thumbnail

Secure Software Summit 2022

Security Boulevard

She is an award-winning innovator with decades of experience pursuing advanced security defenses and next generation security solutions She also tells venture capitalists where to invest billions, helps non-profits pro bono, and ran DevSecOps at Intuit. Aaron’s LinkedIn photo illustrates chaos engineering in action.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Eric George, Director, Solution Engineering – Digital Risk & Email Protection at Fortra , notes that “Organizations will continue to migrate to cloud-based email solutions. While these solutions (such as [Microsoft365]) offer a level of protection and capabilities (antivirus, anti-spam, archiving, etc.),

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Best Attack Surface Management Software for 2024

eSecurity Planet

Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. A solid reputation and track record are also a necessity, and the vendors we’ve reviewed here are all capable of meeting these criteria.

Software 111
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Informed by the MITRE ATT&CK matrix and its wealth of cyber adversary behavior, clients can run advanced scenarios targeting critical assets and continuously improve their defensive posture. AttackIQ’s Anatomic Engine is a differentiator, as it can test machine learning and AI-based cybersecurity components. Picus Security.

article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. The idea, as in any security defense is to sufficiently frustrate an attacker so he or she will go elsewhere. It’s either open or it is still locked. This is something concrete that you can literally hold in your hand.

Hacking 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Within infosec, where so many challenges that are intangible -- like configuring network or firewalls. The idea, as in any security defense is to sufficiently frustrate an attacker so he or she will go elsewhere. It’s either open or it is still locked. This is something concrete that you can literally hold in your hand.

Hacking 52