Explore
Select a tab
19 results found
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
A CTO'S Primer on Q-Day: Part 2 - Post-Quantum Cryptography
Quantum computing threatens current encryption, urging immediate action from CISOs. As Q-Day nears, transitioning to post-quantum cryptography is crucial to protect sensitive data. Embrace hybrid cryptography, modernize inventories, and align with NIST standards to build resilience against quantum threats. Prepare today to secure tomorrow's digital landscape.
Blog
•May 28, 2025
The Time for Post Quantum Encryption is Now, Not Later
This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024
Wiz Continues to Grow their Platform
Wiz announces new features for their platform, showing why it continues to be a leader in the cloud-native application protection platform (CNAPP) market.
Blog
•Aug 13, 2024
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer
This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025
Forming a Responsible AI Team: A Practical Guide
As AI's influence expands, assembling a conscientious AI team—comprising both technical and non-technical members—becomes crucial. This diverse group collaborates to construct, implement and oversee AI systems ethically. This article will delve into the key procedures for forming an AI team.
Blog
•Jun 12, 2024
Intelligent Connections: How AI is Crafting the Next Generation of Connectivity
AI is transforming enterprise IT and network infrastructure. This blog explores the implications and benefits of the paradigm shift toward unified, enhanced network architectures.
Blog
•Feb 8, 2024
Understanding the Cybersecurity Kill Chain: A Simple Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024
Architecting Intelligence: Laying the Foundation of AI Security via Data Governance
AI solutions require a certain level of data governance maturity to be safe and trustworthy. Learn why data governance success extends beyond mere data management to include data quality, security, compliance and proper classification.
Blog
•Feb 6, 2024
Security vs. Privacy, the Difference is Epic
Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024
The Tail is Wagging the Dog More than Ever
It's time for cyber professionals to step up so we can fix the issues that have been plaguing our industry.
Blog
•Jul 29, 2024