Security

TechSpective Podcast Katie Moussouris

Katie Moussouris – Coordinated Vulnerability Disclosure and the Problem with Bug Bounty Platforms

TechSpective Podcast Episode 067 Vulnerabilities are everywhere and they will not be going away. That means they need to be researched and discovered and addressed. But, what is the right way to go about that process? Katie Moussouris, founder and […]

Katie Moussouris – Coordinated Vulnerability Disclosure and the Problem with Bug Bounty Platforms Read More »

Intel transparency supply chain security cybersecurity

The Importance of Transparency: Finding the Balance Between Security and Visibility

Vulnerabilities are a simple fact of life. The goal for vendors and organizations is not to strive to create perfect hardware or software that has no vulnerabilities—there is no such thing. What’s important is ensuring that relevant details and context

The Importance of Transparency: Finding the Balance Between Security and Visibility Read More »

Jayson Street hacker bank robber hugs social engineering

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers

TechSpective Podcast Episode 063 What is a hacker? This is a question that has been debated for decades in the cybersecurity arena. Media conflated hacker and cybercriminal very early on, and it has been challenging to correct that error and

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers Read More »

cybersecurity maturity model CMMC standard

The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All

Security practitioners across the US spent most of Thursday, May 13, reading over, hashing, rehashing, and then re-rehashing the “Executive Order on Improving the Nation’s Cybersecurity” (the Executive Order). Between the mandate for agencies to adopt zero trust, short timelines,

The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All Read More »

Scroll to Top