Sitemap - 2024 - Resilient Cyber
Resilient Cyber Newsletter #28
Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025
Resilient Cyber Newsletter #27
Prevention is Ideal but Detection and Response is a Must: Introducing Wiz Defend
Resilient Cyber w/ Heidi Trost - Human-Centered Security
Resilient Cyber w/ Filip Stojkovski & Dylan Williams - Agentic AI & SecOps
Resilient Cyber Newsletter #26
Agentic AI's Intersection with Cybersecurity
Resilient Cyber Newsletter #25
Invite your friends to read Resilient Cyber!
Resilient Cyber Newsletter #24
Resilient Cyber w/ Walter Haydock - Implementing AI Governance
Resilient Cyber Newsletter #23
Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape
2024 State of the Software Supply Chain
Resilient Cyber Newsletter #22
Resilient Cyber Newsletter #21
Resilient Cyber w/ Tyler Shields and James Berthoty - Is "Shift Left" Losing its Shine?
Resilient Cyber Newsletter #20
"Shift Left" is Starting to Rust
Resilient Cyber w/ Wendy Nather & Casey Ellis - Systemic Cyber Struggles
Resilient Cyber Newsletter #19
Compliance Does Equal Security - Just Not The Elimination of Risk
Resilient Cyber w/ Shyam Sankar - The Primacy of Digital Dominance
Resilient Cyber w/ Mark Simos - Cybersecurity Anti-Patterns
Resilient Cyber Newsletter #18
State of Dependency Management - 2024
Resilient Cyber Newsletter #17
Secure-by-Design vs. Secure-by-Default: What's the Difference?
Resilient Cyber w/ Helen Oakley - Exploring the AI Supply Chain
Resilient Cyber Newsletter #15
Resilient Cyber Newsletter #14
Resilient Cyber w/ Ross Young - How to Become a CISO
The State of Non-Human Identity (NHI) Security
Resilient Cyber Newsletter #13
Resilient Cyber w/ Christina Liaghati - Navigating Threats to AI Systems
Navigating AI Risks with ATLAS
Resilient Cyber Newsletter #12
Cybersecurity's Delusion Problem
Resilient Cyber w/ Steve Wilson - Securing the Adoption of GenAI & LLM's
Resilient Cyber Newsletter #11
Resilient Cyber w/ Snehal Antani - Building and Scaling a Security Startup
How ADR Addresses Gaps in the Detection & Response Landscape
Resilient Cyber Newsletter #10
Resilient Cyber w/ Chloe Messdaghi - AI Security & the Threat Landscape
Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust
Software's Iron Triangle: Cheap, Fast and Good - Pick Two
Resilient Cyber w/ Michael Silva - Securing Non-Human Identities
Vulnerability Exploitation in the Wild
Systemic Concentrated Cyber Risks
Resilient Cyber w/ Travis McPeak - Securing Cloud-native Infrastructure
3 Key Areas for Mitigating Non-Human Identity (NHI) Risks
Resilient Cyber w/ Stuart Mitchell - Cyber Talent, Recruiting & the Workforce
S6E22: Daniel Shechter - Application Detect & Response (ADR)
S6E21: Christopher Kern - Dissecting Secure-by-Design
S6E20: Joe McCaffrey - Securing the Digital Arsenal of Democracy
S6E19: Madison Oliver - Open Source & GitHub Advisory Database
Bringing Security Out of the Shadows
What Are Non-Human Identities and Why Do They Matter?
Public Sector Compliance Conundrums
S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms
The DBIR is entering its Vulnerability Era
S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation
Resilient Cyber w/ Georgianna Shea - Cyber Physical Resilience & Supply Chain Security
The Rise Of Application Security Posture Management (ASPM) Platforms
Open Source Security Landscape 2024
You can't teach someone to swim when they're drowning
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey
Leveraging an AI Security Framework
S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge
S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos
S6E10: Adam Bateman - Securing the Modern Identity Perimeter
S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom
CISA - Secure Software Development Attestation Final Form
OWASP LLM AI Cybersecurity & Governance Checklist
S6E8: Erez Yalon - AppSec, Supply Chain and Security Research
A Look at the UK's National Cyber Security Centre's Vulnerability Management Guidance
S6E7 - Chinmayi Sharma & Jim Dempsey - Software Liability and Safe Harbor
NIST's "Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines"
Software: Liability, Safe Harbor and National Security
S6E6 - Crystal Poenisch - Cybersecurity Product Marketing
S6E5 - Jeevan Singh - Scaling Application Security
U.S. Cyber Trust Mark - Cybersecurity Labeling Program for Smart Devices
Resilient Cyber w/ Joe Lewis - A Year in the Seat - A CISO's Retrospective
S6E3 - Ross Haleliuk - Cyber for Builders & The Cyber Ecosystem
The D.I.E. Triad - Applied to your Career (and Life)
S6E2 - Jacob Horne - 171, CMMC and the Federal Compliance Landscape
Digging into the OWASP AI Exchange
S6E1 - Rob van der Veer - Navigating the AI Security Landscape