February 4, 2022

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028), the Office of Management and Budget (OMB) has released a memorandum addressing the heads […]
February 4, 2022

How Exploit Intel Makes You Less Vulnerable

New research shows effective and efficient vulnerability management hinges on a key ingredient: exploit intel. The data arrives just in time. An expanding threat landscape In […]
February 4, 2022

Defending Against Critical Threats: Analyzing Key Trends, Part 1

Earlier this year we held a live broadcast, featuring cybersecurity threat analysts from across Cisco Secure. We discussed the most significant cyber threats of 2021, what […]
February 1, 2022

Nurturing young tech talent with The Hidden Genius Project 

In the summer of 2019, I flew to California to co-lead a Fusion 360 workshop at Unity Middle School in East Oakland. On the surface, our […]