Mirko Zorz

CISO Insights - Making Security Drive Business Value
John O’Rourke, CISO at PPG, reveals how security can enhance business value. He explains the importance of trust and foundational investments in cybersecurity for reducing friction in sales and M&A processes.
AI Security Operations - Vendors Promise Future Not Yet Realized
AI SOC vendors are making bold promises about autonomous operations, but real-world usage tells a different story. Many organizations are hesitant to trust these tools. Understanding this gap is crucial for effective security operations.
Supply Chain Risk Management - Facility Managers Respond
Facility managers are addressing fragile supply chains in critical systems. With geopolitical instability, innovative strategies are vital for maintaining operations and resilience.
Cloud - NVIDIA Transfers GPU Orchestration to Community Control
NVIDIA has donated its GPU orchestration driver to the CNCF, allowing the Kubernetes community to manage AI workloads. This empowers developers and enhances collaboration in cloud environments. The move marks a significant step towards open-source innovation in AI infrastructure.
Security Tools - Measuring Performance in Real-Time Explained
Organizations need to rethink how they measure security performance. Tim Nan from digiDations highlights the risks of outdated methods. Continuous validation is essential for effective defense.
NIST Updates DNS Security Guidance - First Revision in Years
NIST has updated its DNS security guidance for the first time in over a decade. This impacts organizations relying on DNS for their operations. Enhanced security protocols are crucial for safeguarding network connections and preventing cyber threats.
Field Workers Security - Enhancing Credential Hygiene Practices
Field workers need better security practices, not just more access. Chris Thompson shares insights on credential hygiene and security awareness to protect sensitive data.
Certificate Lifespans Shrinking - Organizations Unprepared
TLS certificate lifespans are being reduced significantly, pushing organizations to adapt quickly. Many are unprepared for the upcoming changes, risking operational disruptions. Immediate action is crucial to avoid potential issues and ensure compliance.
OT Security Needs Unique Solutions, Not IT Thinking
Cybersecurity in manufacturing is facing a critical challenge. Traditional IT security methods are failing to protect industrial environments. This puts your production lines and safety at risk. Experts are calling for tailored strategies to address these unique vulnerabilities.
AWS Security Made Easy with Cloud-audit Tool
Cloud-audit is a new open-source tool for AWS security audits. It checks 15 AWS services and provides fixes for any issues found. This tool is a game-changer for users without dedicated security teams, helping prevent costly data breaches.
Airbus CSO Warns of Supply Chain and Space Threats
Airbus's CSO warns about growing risks in supply chains and space threats. These vulnerabilities could lead to serious disruptions and data breaches. Companies are enhancing monitoring and collaborating with governments to bolster defenses.
Breaking Barriers: Deaf Pros Thrive in Cybersecurity
Deaf and hard-of-hearing professionals are breaking into cybersecurity, showcasing resilience and talent. Their unique perspectives are enhancing security measures and fostering inclusivity in the industry. Companies are now investing in accessibility and training programs to support this movement.