Arathy ShrinarayanThe Key Role of Cybersecurity Strategy in Ensuring Enterprise ResilienceA cybersecurity strategy is a high-level document that outlines how an organization safeguards its assets and address its cybersecurity…Sep 11
InterlynkEU CRA and SBOMThe European Parliament approved the EU’s Cyber Resilience Act (CRA) on March 12th.Mar 22
Alex BodrykOverSecured? 5 Steps to Align Cyber Resiliency Posture and Your Customer HappinessWhile most of the businesses struggle to manage their cyber resilience some are quite good in both business and cyber resilience…Sep 1Sep 1
InterlynkSBOM Requirements for CRAThe European Parliament approved the EU's Cyber Resilience Act (CRA) on March 12th.Mar 25Mar 25
DTCC ConnectionDORA — A Potential Blueprint for Global Cyber Resilience Regulation?By Jason Harrell, DTCC Head of External Engagements, Operational and Technology Risk, CISMAug 26Aug 26
Arathy ShrinarayanThe Key Role of Cybersecurity Strategy in Ensuring Enterprise ResilienceA cybersecurity strategy is a high-level document that outlines how an organization safeguards its assets and address its cybersecurity…Sep 11
InterlynkEU CRA and SBOMThe European Parliament approved the EU’s Cyber Resilience Act (CRA) on March 12th.Mar 22
Alex BodrykOverSecured? 5 Steps to Align Cyber Resiliency Posture and Your Customer HappinessWhile most of the businesses struggle to manage their cyber resilience some are quite good in both business and cyber resilience…Sep 1
InterlynkSBOM Requirements for CRAThe European Parliament approved the EU's Cyber Resilience Act (CRA) on March 12th.Mar 25
DTCC ConnectionDORA — A Potential Blueprint for Global Cyber Resilience Regulation?By Jason Harrell, DTCC Head of External Engagements, Operational and Technology Risk, CISMAug 26
Alex BodrykThe Taxonomy of CISO RolesThe CISO position has become a coveted role in the ever-evolving business landscape, turning into somewhat of a “hot potato” within…Jul 28
Jonathan NgThe Evolution of Cybersecurity Leadership: From CISO to DRROIn the rapidly evolving landscape of digital security and enterprise architectures, fuelled by advancements in Cloud and AI technologies…Aug 24
The Tech TrendThreat Hunting and Sigma RulesTo identify suspicious network activity, threat hunters traditionally employ highly specialized tools and solutions. These solutions can be…Jun 22, 2022