security
You Have Less Than Two Months to Become DORA Compliant
You have less than two months to become DORA compliant if your company is based in the EU or does business in the EU. The post You Have Less Than Two Months ...

Deepfake Fraud, Data Brokers Tracking Military Personnel
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...

Fairwinds Insights Release Notes 16.1.11 – 16.2.4: CVE Mapping Updates
Over the last few months, we’ve been working on making a number of meaningful updates to Fairwinds Insights. We’ve delivered some great new functionality that our Insights customers will definitely benefit from ...

Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses
Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security ...

A Platform Engineering Guide to Managing Secrets with Akeyless
Platform engineering equips development teams with efficient and secure workflows to streamline code deployment at scale. This guide explores the essentials of platform engineering, the value of Internal Developer Platforms (IDPs), and ...

Open-Source Security Tools are Free… And Other Lies We Tell Ourselves
The most expensive security tool isn't the one you pay for - it's the one that fails when you need it most. Just ask those 110,000 websites that thought they were saving ...

Why It’s Time to Leave Twitter
In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for ...
Clever PayPal-based Attack
Do not call that number! This attack is brilliant. It uses a legitimate PayPal email message about a bogus payment to trick you into phoning a bogus PayPal phone number. I have ...
Tackling Swivel Chair Syndrome
TechSpective Podcast Episode 142 Ajit Sancheti, General Manager of NG-SIEM at CrowdStrike recently joined me for an episode of the TechSpective Podcast. With years of experience in cybersecurity and as a ...

The Magic ITAM Formula for Navigating Oracle Java Licensing
IT asset managers have their hands full when they’re trying to strike the best path forward for their companies’ use of Java. Finance leaders at many companies are turning to ITAM professionals ...