Syndicated Blog

Security Archives | TechSpective
a unique perspective on technology

Beyond Detection: Enhancing Your Security Posture with Predictive Cyberthreat Insights

The goal of cybersecurity is not just to respond to today’s threats but to anticipate tomorrow’s challenges. I recently had an enlightening conversation with Christopher Budd, Director of Sophos X-Ops Intelligence, to ...

Guarding Your Business: A Guide to Employee Training for Cybersecurity Vigilance

Protecting your business from scams and cybersecurity threats not only bolsters your business’s practices but also maintains your client’s trust. Without these safeguards, your business could fall victim to irreversible issues like ...

Data Security Posture Management Should Focus on Securing the Data

Organizations use and store many types of data. Some of it is high value containing business-critical information or regulated data, such as PII (personally identifiable information). Other data is less sensitive and ...

HP’s Threat Report – New Threats, Bigger Problems

| | Blog, HP, security, threat report
HP issues a threat report quarterly (this month’s came with a video), and this quarter’s report suggests that things are getting worse with regard to attacks and related monetary damage. While this ...

The Strategic Partnership Elevating API and Endpoint Security

Salt Security has announced a pivotal partnership with CrowdStrike. This collaboration marks a significant milestone for businesses seeking robust, integrated security solutions that cover both endpoints and the increasingly critical API layer ...

Simplifying Cybersecurity from Confusion to Clarity

Cybersecurity is a dynamic and fast-paced industry. Staying ahead of threats requires constant innovation and a keen understanding of the landscape’s evolving challenges. I recently spoke with Ric Smith, Chief Product and ...

Strategic Decision-Making: Balancing Budgets and Security

TechSpective Podcast Episode 124   Cybersecurity is cyclical. Over the past two decades that I have been working in and writing about security, the market has gone from an array of point ...

The Vendor of My Cloud-Vendor is My Friend

What does a suburban roofing company have in common with a cloud supplier? The answer can be found in the passage of time. This conversation occurred with Sean Heide, research technical director ...

The Vital Role of SBOMs and the Pioneering Solutions of Tanium

| | SBOM, Security Awareness, Tanium
The concept of protecting from risks originating from the Software Supply Chain (SSC) has emerged as a cornerstone for robust digital defense in an era with growing software supply chain attacks. A ...

Keep Time on Your Side – What We Need to Understand about Ransomware Attacks

Ransomware has dominated the security conversation in recent years. But even so, many people and organizations still don’t understand how these attacks unfold, despite their efforts to protect their respective attack surfaces ...