Category: InfoSec
AMAROK: 5 Point Plan for Dealing with Commercial Property Theft
Posted by Mighty Guides | Dec 30, 2023
Analog Devices and Mouser Electronics: Embedded Security: Keeping Edge Data Safe
Posted by Mighty Guides | Sep 11, 2023
Megaport: The Top 5 Challenges of Firewall Management
Posted by Mighty Guides | Aug 14, 2023
Trustwave: 8 Experts on the Myths of Attack Surface Management
Posted by Mighty Guides | Mar 15, 2023
Are you a Security expert? Participate in a Mighty Guide.
Featured Experts
Tom Dugas: Rapidly Reduce Email-Based Attacks
Feb 7, 2021
Matthew Otwell: Identify Deficiencies That Exist
Nov 9, 2020
Dmitriy Sokolovskiy: Expand Your Visibility
Nov 8, 2020
Daniel Paula: Ending and Preventing Breaches
Jul 29, 2019
Tad Dickie: Threat Hunting and Incident Response
Jul 29, 2019
Brian Shea: The MSSP Tech Stack
Jul 29, 2019
Rachel Guinto: When to Leverage an MSSP
Jul 29, 2019
James Carder: Automation and Correlation are Key
May 10, 2019
Mauro Loda: Cloud and Container Security Series
Apr 15, 2019
Ross Young: Cloud and Container Security Series
Apr 15, 2019
Darrell Shack: Cloud and Container Security Series
Apr 15, 2019
Paul Dackiewicz: Cloud and Container Security Series
Apr 15, 2019
Katherine Riley: Cloud and Container Security Series
Apr 15, 2019
Dr. Rebecca Wynn: Take The Time To Train Your Tools
Oct 18, 2018
Adam Ely: Choose Security Metrics That Tell a Story
Aug 19, 2018
Mark Weatherford: Long-Term Goals Guide CDM Success
Jul 24, 2018
Renee Forney: The Right Resources Ensure CDM Success
Jul 24, 2018
Luis Brown: Frameworks Need to Adapt
Jul 19, 2018
Kalpesh Doshi: A Framework Is a Foundation
Jul 19, 2018
Nir Yizhak: Framework as an Instrument of Change
Jul 18, 2018
Hemanta Swain: Quick Response Is the Key
Jul 9, 2018
Featured Articles
- Brian Bobo, CISO, Sun Country Airlines, To Minimize Noise, You Need To Select The Right Tools >>
- Bruce Phillips, SVP & CISO, Williston Financial Group, Security Automation Begins With A Process >>
- Don Welch, Chief Information Security Officer, Penn State University, Security Automation Requires Different Skills >>
- Dr. Rebecca Wynn, Head of Information Security & Data Protection Officer, Matrix Medical Network, Take The Time To Train Your Tools >>
- Sijmen Ruwhof, Freelance IT Security Consultant / Ethical Hacker, Secundity, Automation Tools Need To Be Tuned To Risk Scenarios >>
- Slim Trabelsi, Senior Security Architect, SAP, Correlating Security Data From Multiple Sources Requires Deep Learning Tools >>
- Steve Stonebraker, Principal Security Architect, Guaranteed Rate, Security Automation Begins With Visibility >>
- Daniel Newsome, Senior Web Architect, Zonar Systems, Work Incrementally, and Take Full Advantage of Cloud-Native Tools >>
- Dan Bowden, VP & CISO, Sentara Healthcare, Bake as Much into the DevOps Process as Possible >>
- Kevin Price, Principal Infrastructure Engineer- Information Security, GE Appliances, a Haier Company, Select Security Tools that Work in an Automated DevOps Workflow >>
- Levi Blackstone, Software Developer IV, Rackspace, A Cloud-Native Environment Enables More Granular Defense in Depth >>
- Nuwan Bandara, Director – Solutions Architecture, WSO2, When Architecting a Cloud-Native App, Think about End-to-End Security >>
- Marcelo Grebois, Infrastructure Developer, Telefónica NEXT, Developers Need to Learn More about Security >>
- William Caban, DevOps Technical Solutions Architect, Global Cloud and Automation Team, World Wide Technology, Cloud-Native Requires Rethinking Traditional App Development >>
- Rebecca Wynn, Head of Information Security & Data Protection Officer, Senior Director, Matrix Medical Network: ‘Set and Forget’ Is Lazy Security >>
- Joseph Smith, Interim Director of Information Technology, University of Maryland Eastern Shore: A Security Practice Needs to Demonstrate Continuous Improvement >>
- Todd Spight, Chief Information Officer, Columbia College Chicago: A Security Practice Needs to Demonstrate Continuous Improvement >>
- Katrina Biscay, Director of Information Security, University of Cincinnati: Broaden the Analytical Skills within Your SOC >>
- Hemanta Swain, Sr. Director & Information Security Officer, TiVo: Quick Response Is the Key >>
- Paul Heffernan, Group Chief Information Security Officer, Unipart Group: Moving from File Locking to Behavior Locking >>
- Kevin McLaughlin, Director – Deputy CISO and a Professor, Stryker: Bimodality and Digitization Can Help You Detect the Unknown Threat >>
- Steve Stonebraker, Principal Security Architect, Guaranteed Rate: To Secure Endpoints, You Need a Complete View of Threats >>
- Lester Godsey, Chief Information Security Officer, City of Mesa: More Data Makes the Behavioral Analysis More Accurate >>
- Jason Kinder, Director, Corporate Security – Cyber Security & SOC Operations, DRS Technologies, Inc.: Active Threat Management Requires New Tools and Skills >>
- Nick Green, Senior Director Information Security for EMEA/APAC, Ticketmaster, In a Large Organization, Know the Risk Owners and Adapt to Their Needs >>
- Pieter VanIperen, Senior Architect, Automation, Advanced Integration, Security, TD Ameritrade, Risk Assessment and Prioritization is a Triage Process >>
- Jayesh Kalro, Security Architect, CA Technologies, To Manage Vulnerabilities Effectively, Define Business Priorities and Identify Critical Assets >>
- Juan Morales, Senior Director, Global Information Security – Cyber Security & Incident Response, Realogy Holdings Corp., Focus First on Assets That Keep The Business Running >>
- John Trujillo, Technology Leader and Information Security Officer, Pacific Life Insurance Company, You Must Understand the Business Function of Digital Assets >>
- Surinder Lall, Senior Director Information Security, Viacom / Paramount Pictures, The Key To Risk Prioritization is Risk Assessment >>
- Bobby Adams, Sr. Security Architect, Advanced Technology & Enterprise Architecture, TD Ameritrade, A Holistic, Enterprise-Wide Strategy is Essential >>