Over the last decade, cybersecurity heavily invested in EDR, XDR, SIEM, telemetry, and SOC-driven operations. We stopped asking how to stop attacks and started asking how fast we could detect them. However, Mythos and frontier models have changed that paradigm. How do you detect a -7 day vulnerability? Detection and response cannot keep, so wha...
Legal departments are under continual pressure to solve problems effectively and integrate innovative technology all while reducing costs and complexity. Enter cybersecurity, a complex and potentially costly risk. How should legal departments prepare?
Walter Wilkens, Head of Delivery, North America at DWF Legal Operations, joins Business Securit...
As security leaders, we are continuously selling, maybe not as traditional sales folks, but as selling security across the organization. Whether you’re closing client deals, leading a team, running a business, or simply wanting your voice to be heard by other executives or the board, we are selling. How can influence help?
Dan Rochon, Author of ...
During a National Association of State Chief Information Officers conference, officials like Rex Menold, Michigan's chief security officer, shared that agencies, not central IT, often decide on security priorities.
Welcome to Founder Stories. On this episode, we welcome Guy Teverovsky, Chief Technology Officer and Founder at Semperis, to discuss his founder journey from Microsoft Active Directory MVP to Co-Founder and CTO. Guy shares a glimpse into a technical founder's journey, which requires more than just technology to succeed. In this interview, we explo...
Infosecurity Magazine reports that a significant number of cybersecurity professionals are considering switching careers due to a lack of a pay raise and a sense of not being appreciated at work.
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.