Sitemap - 2024 - Resilient Cyber

Resilient Cyber Newsletter #28

Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025

Resilient Cyber Newsletter #27

Prevention is Ideal but Detection and Response is a Must: Introducing Wiz Defend

Resilient Cyber w/ Heidi Trost - Human-Centered Security

Resilient Cyber w/ Filip Stojkovski & Dylan Williams - Agentic AI & SecOps

Resilient Cyber Newsletter #26

Agentic AI's Intersection with Cybersecurity

Resilient Cyber Newsletter #25

Invite your friends to read Resilient Cyber!

Resilient Cyber Newsletter #24

Resilient Cyber w/ Walter Haydock - Implementing AI Governance

Resilient Cyber Newsletter #23

Resilient Cyber w/ Jim Dempsey - Navigating the Cyber Regulatory Landscape

2024 State of the Software Supply Chain

Resilient Cyber Newsletter #22

Resilient Cyber Newsletter #21

Resilient Cyber w/ Tyler Shields and James Berthoty - Is "Shift Left" Losing its Shine?

Resilient Cyber Newsletter #20

"Shift Left" is Starting to Rust

Resilient Cyber w/ Wendy Nather & Casey Ellis - Systemic Cyber Struggles

Resilient Cyber Newsletter #19

Compliance Does Equal Security - Just Not The Elimination of Risk

Resilient Cyber w/ Shyam Sankar - The Primacy of Digital Dominance

Resilient Cyber w/ Mark Simos - Cybersecurity Anti-Patterns

Resilient Cyber Newsletter #18

State of Dependency Management - 2024

Resilient Cyber Newsletter #17

Secure-by-Design vs. Secure-by-Default: What's the Difference?

Resilient Cyber w/ Helen Oakley - Exploring the AI Supply Chain

Resilient Cyber Newsletter #15

Resilient Cyber Newsletter #14

Cybersecurity Workforce Woes

Resilient Cyber w/ Ross Young - How to Become a CISO

The State of Non-Human Identity (NHI) Security

Resilient Cyber Newsletter #13

Resilient Cyber w/ Christina Liaghati - Navigating Threats to AI Systems

Navigating AI Risks with ATLAS

Resilient Cyber Newsletter #12

Cybersecurity's Delusion Problem

Resilient Cyber w/ Steve Wilson - Securing the Adoption of GenAI & LLM's

Resilient Cyber Newsletter #11

Resilient Cyber w/ Snehal Antani - Building and Scaling a Security Startup

How ADR Addresses Gaps in the Detection & Response Landscape

Resilient Cyber Newsletter #10

Resilient Cyber w/ Chloe Messdaghi - AI Security & the Threat Landscape

Resilient Cyber w/ Rob Allen - Endpoint Protection, VulnMgt & Zero Trust

Software's Iron Triangle: Cheap, Fast and Good - Pick Two

Resilient Cyber Newsletter #9

Resilient Cyber Newsletter #8

Resilient Cyber w/ Michael Silva - Securing Non-Human Identities

Vulnerability Exploitation in the Wild

Sponsoring Resilient Cyber

Resilient Cyber Newsletter #7

Systemic Concentrated Cyber Risks

Resilient Cyber w/ Travis McPeak - Securing Cloud-native Infrastructure

3 Key Areas for Mitigating Non-Human Identity (NHI) Risks

Resilient Cyber Newsletter #6

Resilient Cyber w/ Stuart Mitchell - Cyber Talent, Recruiting & the Workforce

Resilient Cyber Newsletter #5

Resilient Cyber Newsletter #4

S6E22: Daniel Shechter - Application Detect & Response (ADR)

Resilient Cyber Newsletter #3

Resilient Cyber Newsletter #2

Resilient Cyber Newsletter #1

S6E21: Christopher Kern - Dissecting Secure-by-Design

S6E20: Joe McCaffrey - Securing the Digital Arsenal of Democracy

S6E19: Madison Oliver - Open Source & GitHub Advisory Database

Bringing Security Out of the Shadows

What Are Non-Human Identities and Why Do They Matter?

Public Sector Compliance Conundrums

S6E16: Alon Schindel - Cloud Threats and Cloud Security Platforms

A Digital Scouts Honor

The DBIR is entering its Vulnerability Era

S6E15: John Hammond - Cybersecurity Industry Trend Analysis & Content Creation

Resilient Cyber w/ Georgianna Shea - Cyber Physical Resilience & Supply Chain Security

The Rise Of Application Security Posture Management (ASPM) Platforms

Open Source Security Landscape 2024

You can't teach someone to swim when they're drowning

S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey

Leveraging an AI Security Framework

S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge

S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos

S6E10: Adam Bateman - Securing the Modern Identity Perimeter

S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom

CISA - Secure Software Development Attestation Final Form

Death Knell of the NVD?

OWASP LLM AI Cybersecurity & Governance Checklist

S6E8: Erez Yalon - AppSec, Supply Chain and Security Research

A Look at the UK's National Cyber Security Centre's Vulnerability Management Guidance

S6E7 - Chinmayi Sharma & Jim Dempsey - Software Liability and Safe Harbor

NIST's "Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines"

Software: Liability, Safe Harbor and National Security

S6E6 - Crystal Poenisch - Cybersecurity Product Marketing

S6E5 - Jeevan Singh - Scaling Application Security

U.S. Cyber Trust Mark - Cybersecurity Labeling Program for Smart Devices

Resilient Cyber w/ Joe Lewis - A Year in the Seat - A CISO's Retrospective

S6E3 - Ross Haleliuk - Cyber for Builders & The Cyber Ecosystem

The D.I.E. Triad - Applied to your Career (and Life)

S6E2 - Jacob Horne - 171, CMMC and the Federal Compliance Landscape

Digging into the OWASP AI Exchange

S6E1 - Rob van der Veer - Navigating the AI Security Landscape