Image Security Compliance Best Practices AI Safety & Security The UK’s AI Cyber Security Code of Practice: What It Means for Your Business February 27th, 2025 The Code establishes baseline cybersecurity requirements across the AI lifecycle and is expected to inform... Read Now
Image Return on Mitigation Best Practices A Call for a New Cybersecurity Measurement Standard February 26th, 2025 Cybersecurity initiatives provide financial value to organizations. Still, translating the benefits of cybersecurity into dollars and cents has long been a challenge for security teams. Read Now
Image Best Practices Return on Mitigation PullRequest The Cost Savings of Fixing Security Flaws in Development February 25th, 2025 There’s no debate that catching and fixing security flaws in development saves time, money, and stress. Read Now
Image Return on Mitigation Research Best Practices A New Approach to Proving Cybersecurity Value (That Isn’t ROI) February 14th, 2025 Over the past 8 months, Luke (hakluke) Stephens and I have spoken with 10 security... Read Now
Image Security Compliance Best Practices DORA Compliance Is Here: What Financial Entities Should Know January 31st, 2025 The new DORA regulation: everything your organization needs to know about its impact and how to comply. Read Now
Image AI Safety & Security Bug Bounty Vulnerability Management Best Practices Hope in the Fight Against Cyber Threats: A New Year’s Message to CISOs January 23rd, 2025 Facing the Reality: Cybersecurity’s Mounting Pressures The cybersecurity landscape is evolving at an unprecedented pace... Read Now
Image Best Practices Vulnerability Management ROI Isn’t Cutting It: 6 Questions to Help CISOs Better Quantify Security Investments January 7th, 2025 However, in cybersecurity, quantifying net profit becomes significantly more complex due to the intangible nature... Read Now
Image Best Practices Bug Bounty How Ethical Hackers Help AS Watson Address Digital Risk March 19th, 2024 Learn how AS Watson's bug bounty program helps them identify and remediate digital risk. Read Now
Image Best Practices Vulnerability Management Five Takeaways from Ohio Secretary of State's VDP Success Story July 18th, 2023 Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and... Read Now