AMAROK: 8 Experts on Proactive vs. Reactive Perimeter Security Posted by Mighty Guides | Dec 28, 2022 The book includes insights from the following experts: Michael Dorrington, SVP, Sales and... Read More
Anomali: The Need to Focus on the Adversary Posted by Mighty Guides | Dec 14, 2022 The book includes insights from the following experts: Micah Czigan, CISO, Georgetown University... Read More
Security Compass: Developer-Centric Software Threat Modeling Powered by Automation Posted by Mighty Guides | Sep 19, 2022 The book includes insights from the following experts: Dan Bowden, Global CISO, Marsh William... Read More
Trustwave: 8 Experts on Achieving Better Supply Chain Security Posted by Mighty Guides | Sep 19, 2022 The book includes insights from the following experts: Terry Wasti, Director – Infor FSM... Read More
Malwarebytes: A Defender’s Guide to Ransomware Resilience Posted by Mighty Guides | Sep 19, 2022 The book includes insights from the following experts: Zachary Lewis, AVP, Information Technology,... Read More