You Have Less Than Two Months to Become DORA Compliant

| | security
You have less than two months to become DORA compliant if your company is based in the EU or does business in the EU. The post You Have Less Than Two Months ...
Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy

Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...
Fairwinds Insights Release Notes 16.1.11 - 16.2.4: CVE Mapping Updates

Fairwinds Insights Release Notes 16.1.11 – 16.2.4: CVE Mapping Updates

| | security
Over the last few months, we’ve been working on making a number of meaningful updates to Fairwinds Insights. We’ve delivered some great new functionality that our Insights customers will definitely benefit from ...
Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses

Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses

Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security ...
End-to-end Secure GitOps: Akeyless, ArgoCD, & Port.io

A Platform Engineering Guide to Managing Secrets with Akeyless

Platform engineering equips development teams with efficient and secure workflows to streamline code deployment at scale. This guide explores the essentials of platform engineering, the value of Internal Developer Platforms (IDPs), and ...
platforms, security, tool, tooling, AI coding, tools, tools cybersecurity multi-tool

Open-Source Security Tools are Free… And Other Lies We Tell Ourselves

The most expensive security tool isn't the one you pay for - it's the one that fails when you need it most. Just ask those 110,000 websites that thought they were saving ...
Security Boulevard
Is It Time to Delete Your Twitter Account? Here's What You Need to Know

Why It’s Time to Leave Twitter

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for ...

Clever PayPal-based Attack

| | Cybersecurity, security
Do not call that number! This attack is brilliant. It uses a legitimate PayPal email message about a bogus payment to trick you into phoning a bogus PayPal phone number. I have ...

Tackling Swivel Chair Syndrome

TechSpective Podcast Episode 142   Ajit Sancheti, General Manager of NG-SIEM at CrowdStrike recently joined me for an episode of the TechSpective Podcast. With years of experience in cybersecurity and as a ...
The Magic ITAM Formula for Navigating Oracle Java Licensing

The Magic ITAM Formula for Navigating Oracle Java Licensing

| | Java, OpenJDK, security
IT asset managers have their hands full when they’re trying to strike the best path forward for their companies’ use of Java. Finance leaders at many companies are turning to ITAM professionals ...