- Product Management How Security Can Better Support Software Engineering Teams
Security and software engineering teams often operate with different incentives, creating friction when trying to weave security into the development lifecycle. Bridging this gap requires...
- Leadership Security Leaders Can Lower Expenses While Reducing Risk
In a climate of budget constraints, cybersecurity leaders can find opportunities to cut costs while actually strengthening their security posture. By adopting zero-based budgeting and identifying...
- Malware The Language and Nature of Fileless Attacks Over Time
The term "fileless" originated in 2001 to describe malware that existed solely in memory, but has expanded to encompass malicious documents, scripts, living-off-the-land techniques, and memory...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Risk Management First Impression Tips for Security Startups
Making a good first impression requires researching prospects before contact, establishing credibility by demonstrating relevant experience, and customizing elevator pitches to the listener's...
- Risk Management Information Security Measures Commensurate With Risky Behavior
Security safeguards could be applied selectively based on users' demonstrated tendency toward risky computer behavior—people whose systems were frequently infected or who clicked simulated phishing...