Overview
Explore
Partners
Select a tab
23 results found
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
The Grizzled CyberVet: State of Network Security
Network security has evolved rapidly, with the field now embracing zero trust, AI-driven defenses and integrated platforms. The next five years will see AI, SASE and quantum-resistant cryptography reshape the landscape. Enterprises must consolidate tools, adopt AI automation and prioritize identity-first security to stay ahead of increasingly sophisticated cyber threats. Secure your future now.
Blog
•Feb 18, 2025
PCI DSS 4.0 and ASPM: Resistance is Futile
The Payment Card Industry Data Security Standard (PCI DSS) 4.0 introduces new requirements for application security teams, emphasizing the need for continuous and proactive approaches to application security.
Blog
•Mar 21, 2024
API Security and ASPM - A More Perfect Union
Learn how Application Security Posture Management (ASPM) and API Security are a more perfect union, and why the announcement of a technical alliance between Akamai and Apiiro is so exciting.
Blog
•Jan 18, 2024
Speeding up Container Security with NVIDIA Blueprint: Accelerated Vulnerability Analysis
In the dynamic world of cybersecurity, the ability to swiftly and accurately analyze vulnerabilities is crucial. Traditional methods, often labor-intensive and time-consuming, struggle to keep up with the increasing volume and complexity of threats. The NVIDIA Vulnerability Analysis Blueprint offers a transformative solution, leveraging advanced AI technologies to redefine container security.
Blog
•Feb 3, 2025
Security vs. Privacy, the Difference is Epic
Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024
The Imperative Shift Left: How API Security is Redefining Traditional SecOps
In today's IT landscape, digital transformation is driving change in IT. We posit that API security will be the technology that will finally make the "shift left" a reality. Here's why.
Blog
•Mar 5, 2024
PCI DSS 4, APIs and You - The Ostrich is Looking Around
The Payment Card Industry (PCI) Security Standards Council's Data Security Standard (DSS) 4.0, effective March 31, 2024, introduces significant updates with a focus on API security. It mandates broader code repository coverage, emphasizes secure development practices, and encourages early integration of security measures, marking a notable shift towards a proactive security culture in handling sensitive payment information.
Blog
•Feb 28, 2024
The SSDAF - A Shot Across the AppSec Bow
The United States federal government has released the Secure Software Development Attestation Form (SSDAF), which signifies a new and stringent stance on secure software development practices.
Blog
•Apr 22, 2024
Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?
This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024
OWASP API Top Ten Deep Dive Part 4
Part 4 of 5 on the 2023 OWASP API Top Ten.
Blog
•Nov 3, 2023