- Leadership Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
The common adage that "security is everyone's responsibility" often fails due to the diffusion of responsibility, where individuals assume someone else will act. Effectively distributing...
- Product Management How Security Can Better Support Software Engineering Teams
Security and software engineering teams often operate with different incentives, creating friction when trying to weave security into the development lifecycle. Bridging this gap requires...
- Leadership Security Leaders Can Lower Expenses While Reducing Risk
In a climate of budget constraints, cybersecurity leaders can find opportunities to cut costs while actually strengthening their security posture. By adopting zero-based budgeting and identifying...
- Malware The Language and Nature of Fileless Attacks Over Time
The term "fileless" originated in 2001 to describe malware that existed solely in memory, but has expanded to encompass malicious documents, scripts, living-off-the-land techniques, and memory...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Risk Management First Impression Tips for Security Startups
Making a good first impression requires researching prospects before contact, establishing credibility by demonstrating relevant experience, and customizing elevator pitches to the listener's...