Syndicated Blog

Security – TechSpective
a unique perspective on technology

Tackling Swivel Chair Syndrome

TechSpective Podcast Episode 142   Ajit Sancheti, General Manager of NG-SIEM at CrowdStrike recently joined me for an episode of the TechSpective Podcast. With years of experience in cybersecurity and as a ...

The USA From A Cybercriminal’s Perspective: A Diversifying Landscape

Given the USA’s continuous exposure to cybercriminals and cyberattacks, it has become one of the most experienced nations in defending against cybercrime. From nation-state-sponsored cyber espionage to ransomware attacks conducted by financially ...

From Data to Cloud: Bridging Security Gaps with DSPM and CSPM

| | Blog, cspm, DSPM, security
Over the past few years, businesses have rapidly expanded their digital infrastructure to accommodate distributed workforces and implemented a slew of modernization initiatives to bring them into the digital era. This has ...

The Hidden Dangers of Shadow AI  

Even before artificial intelligence (AI) became a ubiquitous term, the cybersecurity risks it presented were creating challenges for organizations. This is a security gap that is widening not only as attackers weaponized ...

IBM Launches Guardium Data Security Center: Well-Timed for High-Risk Sites

With China showcasing significant recent advancements in quantum computing on top of the concern that a quantum computer could break even the most powerful cryptographic protections in a matter of minutes, having ...

Unlocking Proactive Compliance with Adobe’s Common Controls Framework

TechSpective Podcast Episode 141 I had the pleasure of speaking with Devansh Sharma, Senior Security and Compliance Product Owner at Adobe, about a game-changing approach to security and compliance: Adobe’s Common Controls ...

Unlocking the Power of Continuous Threat Exposure Management

TechSpective Podcast Episode 140   I recently sat down with Jason Fruge, CISO-in-residence at XM Cyber, for an engaging discussion about one of the most critical shifts happening in cybersecurity today: Continuous ...

IBM X-Force Threat Report Still Indicates the Biggest Threat Is You

October is Cybersecurity Awareness Month. In conjunction with that, IBM has released an updated X-Force Threat report. This report was developed using threat intelligence from Cybersixgill, Red Hat Insights, and the IBM ...

Unlocking the Power of AI in Threat Hunting

TechSpective Podcast Episode 139   In the latest TechSpective Podcast, I had the pleasure of speaking with Wilson Tang, a Machine Learning Engineer on Adobe’s threat hunting team. Our conversation delved into ...

Exploring the Future of Cloud Security

TechSpective Podcast Episode 138   Cloud environments have transformed the way organizations operate, but they’ve also introduced new challenges for cybersecurity teams. In the latest episode of the TechSpective Podcast, I sit ...