Business
WordPress is a favorite blogging tool of mine and I share tips and tricks for using WordPress here.
Renforcer les opérations de sécurité à l’aide des données et de l’IA
Renforcer les opérations de sécurité à l’aide des données et de l’IA
“Si vos données de sécurité pouvaient parler, que diraient-elles ? Avec l‘IA générative, il ne s’agit plus d’une question rhétorique.…
Agentic AI in SecOps – At the Threshold of Harnessing Intelligent Action
Agentic AI in SecOps – At the Threshold of Harnessing Intelligent Action
Security operations teams struggle to keep up with the overwhelming volume of threat data, limited expertise, and staffing challenges, leading…
S&P Global AI for security: Agentic AI will be a focus for security operations in 2025
S&P Global AI for security: Agentic AI will be a focus for security operations in 2025
Generative AI is increasingly used in security to analyze vast amounts of detection data that can overwhelm human analysts. While…
Strengthening Security Operations with Data and AI
Strengthening Security Operations with Data and AI
What would your security data say if it could talk? With generative AI, that’s no longer a hypothetical. While AI…
A Buyer’s Guide to CNAPP
A Buyer’s Guide to CNAPP
The CNAPP Buyer’s Guide is intended to raise awareness of how a CNAPP helps, as well as what characteristics to…
5 Strategies to Defend Against the Growing Risk of Ransomware
5 Strategies to Defend Against the Growing Risk of Ransomware
Every year the disruptive impact of ransomware increases. Read to learn how organizations can preserve business continuity in the face…
7 Proven Strategies to Unlock Developer Adoption
7 Proven Strategies to Unlock Developer Adoption
Effectively securing applications requires more than just discovering risks; it demands a strong partnership with development teams. This whitepaper…
The Ultimate AppSec RFP Checklist & Guide
The Ultimate AppSec RFP Checklist & Guide
Selecting the right application security (AppSec) vendor is crucial in today’s fast-evolving development landscape. This guide and checklist provide a…
Top 6 Considerations for Container Security
Top 6 Considerations for Container Security
In today’s fast-paced development environment, securing containers is paramount. This ebook outlines six key considerations for choosing the right container…
Checkmarx One Platform
Checkmarx One Platform
This third-party test report provides a comparative analysis of Checkmarx One Platform’s SAST and SCA application security efficacy against a…