- Leadership The CISO's Mindset: Outcomes, Automation, and Leadership
The role of the CISO evolving into a blend of leadership and technical expertise, with increased accountability for business outcomes. Key trends include leveraging automation and AI to enhance...
- Authentication What to Do With Products Without SSO?
Single Sign-On (SSO) acts as a crucial chokepoint for modern defense, centralizing authentication to enforce security measures and monitor access. When purchasing SaaS products without SSO,...
- Cloud Withholding Single Sign-On from SaaS Customers is Bad for Business and Security
Many SaaS vendors restrict Single Sign-On (SSO) to their most expensive enterprise tiers, a practice that undermines the security of smaller customers. This pricing strategy is misguided, as SSO is a...
- Cloud Untangling the Complexity of SaaS Ownership in the Enterprise
The ease with which employees can adopt SaaS applications creates a visibility and governance gap for IT and security teams. Addressing this complexity involves documenting roles and...
- Tools How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot automates OSINT collection from numerous data sources, including Shodan and Have I Been Pwned, to gather intelligence about IPs, domains, and email addresses. Running the free, open source...
- Malware Analysis How to Get and Set Up a Free Windows VM for Malware Analysis
Setting up a malware analysis lab requires virtualization software, a Windows virtual machine, and the right tools. Microsoft offers free Windows 10 VMs that expire after 90 days, and utilities like...