Latest Research
Generative AI
Three Ways AI Can Hack the U.S. Election
The growing capability of AI content poses three very real threats to modern elections. We explain each, and take a glimpse at a possible solution to the growing AIpocalypse.
Latest Research
Strategies
Looking Forward, Looking Back: A Quarter Century as a CISO
Gail Coury explores how cybersecurity has evolved and what the future holds, after a distinguished career as a CISO.
Expert Advice, and Insights From Cybersecurity Leaders
"Insights" is our term for articles written by experts who look at the field of cybersecurity through a strategic lens. Best practices for security controls, advice on how to mature and improve existing programs, guidance on compliance requirements, and generally things that "defenders need to know" can all be found here. We'll discuss what works and what doesn't, as well as how to prepare for the security needs of next year and the next five years. We'll even give you the tools you need to have discussions with the non-security folks in your leadership so you can convince them that these problems have real business impacts and they need to enable you to take action.
Strategies
AI is Here: How Should CISOs Respond?
AI tools are spreading rapidly and CISOs need to be ready.
Strategies
The Bleak Reality and Hopeful Future of Security Automation
Security automation continues to be an enticing capability for security programs and while it delivers on many promises, it does not fully deliver the promised workforce economic benefit.
Strategies
F5 Labs Joins the Exploit Prediction Scoring System as a Data Partner
As of March we are contributing our vulnerability targeting intelligence to FIRST’s Exploit Prediction Scoring System.
Strategies, Trends, Security Controls, and Compliance
It seems like every year there's a new hot trend in the world of cybersecurity that everyone must develop a plan for. We've been there, many times, and we've gotten pretty good at being able to tell when a trend has some substance to it. Sometimes you'll need to develop a new policy, or get ahead of a compliance requirement. Sometimes you'll need to convince the C-suite that while there isn't a problem now, the time to solve the problem that's coming is now. And sometimes you'll need to accept that a problem isn't ever completely preventable, and the best thing you can do is prepare a mitigation strategy for when that breach does finally happen.
On the other hand, sometimes it will seem like the way you've "always done things" just isn't good enough anymore, and you need to find a different schema for understanding your problem set and a different way of prioritizing actions. (CVSS-based vulnerability patching, we're looking at you.) AI clearly isn't going away, but it just as clearly can't fully replace trained cybersecurity professionals, so understanding where AI can help and where it's just hype will be critical to running an effective security shop in the coming years.
Voices From Across the Industry
We think there's deep value in providing a diversity of experience and opinions, and so we've invited cybersecurity experts from many fields to give us their perspective. Many of these authors have served as CISOs or equivalent positions, and they've got the experience to know when the latest buzzwords are something we need to pay attention to, and when it's just a bunch of vaporware. Below you can see a sampling of our guest authors.
Strategies
I Was a Human CAPTCHA Solver
A behind-the-scenes peek into the hidden world of human click farms.
Ready to Learn More?
From predictions for the future, to avoiding data breaches, to explanations of why you should use passphrases over passwords, we cover a variety of topics from the perspective of people who have put out a lot of fires. We have advice for startups all the way to the biggest companies in the world, and for CISOs all the way to folks in their first week on the job. Below, you can find all of our insights.