Explore
Select a tab
16 results found
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
The Time for Post Quantum Encryption is Now, Not Later
This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
Understanding the Cybersecurity Kill Chain: A Simple Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the cybersecurity kill chain. We simplify and explain this model used by attackers to compromise your digital ecosystem.
Blog
•Nov 6, 2024
Intelligent Connections: How AI is Crafting the Next Generation of Connectivity
AI is transforming enterprise IT and network infrastructure. This blog explores the implications and benefits of the paradigm shift toward unified, enhanced network architectures.
Blog
•Feb 8, 2024
Wiz Continues to Grow their Platform
Wiz announces new features for their platform, showing why it continues to be a leader in the cloud-native application protection platform (CNAPP) market.
Blog
•Aug 13, 2024
Platforms vs. Point Solutions: Perspectives from the Executive, Consultant, and Engineer
This fourth article in the 5-part series compares platforms and point solutions through the perspectives of executives, consultants and engineers. It highlights their priorities, objections and ways to overcome challenges, offering insight into how different roles contribute to finding the right balance between simplicity, flexibility and long-term cybersecurity success.
Blog
•Jan 7, 2025
Architecting Intelligence: Laying the Foundation of AI Security via Data Governance
AI solutions require a certain level of data governance maturity to be safe and trustworthy. Learn why data governance success extends beyond mere data management to include data quality, security, compliance and proper classification.
Blog
•Feb 6, 2024
Cybersecurity Platforms vs. Point Solutions: Swiss Army Knives or Precision Tools?
This first article in a 5-part series explores the difference between cybersecurity platforms and point solutions. It explains how platforms offer unified, scalable protection while point solutions deliver specialized, best-in-class capabilities. Using simple analogies, it shows how these approaches tackle complex business challenges, setting the stage for deeper dives in upcoming articles.
Blog
•Dec 5, 2024
The Case for Cybersecurity Platforms: Simplify, Integrate and Conquer
This third article in the 5-part series makes the case for cybersecurity platforms. It explores how platforms provide integrated, scalable protection, simplify management and deliver long-term cost efficiency. By unifying tools and reducing complexity, platforms offer businesses a streamlined, future-ready approach to cybersecurity without sacrificing quality or security efficacy.
Blog
•Dec 19, 2024
Security vs. Privacy, the Difference is Epic
Cyber teams need to understand the difference between security and privacy and apply them to every system in production.
Blog
•Aug 9, 2024
The Tail is Wagging the Dog More than Ever
It's time for cyber professionals to step up so we can fix the issues that have been plaguing our industry.
Blog
•Jul 29, 2024