SC Awards Finalist: Best Insider Threat Solution – EchoMark – Troy Batterberry – SCA26 #1 data-security risk-identificationclassificationmitigation SC Awards Finalist: Best Insider Threat Solution – EchoMark – Troy Batterberry – SCA26 #1 Mike Shema March 27, 2026 Read More Read more about SC Awards Finalist: Best Insider Threat Solution – EchoMark – Troy Batterberry – SCA26 #1
SC Awards Finalist: Best SME Security Solution – Stellar Cyber – Steve Garrison – SCA26 #1 siem SC Awards Finalist: Best SME Security Solution – Stellar Cyber – Steve Garrison – SCA26 #1 Mike Shema March 27, 2026 Read More Read more about SC Awards Finalist: Best SME Security Solution – Stellar Cyber – Steve Garrison – SCA26 #1
SC Awards Finalist: Security Executive of the Year – Ankur Shah – SCA26 #1 leadership SC Awards Finalist: Security Executive of the Year – Ankur Shah – SCA26 #1 Mike Shema March 27, 2026 Read More Read more about SC Awards Finalist: Security Executive of the Year – Ankur Shah – SCA26 #1
SC Awards Winner: Best CTEM Solution – Reach Security – Garrett Hamilton – SCA26 #1 threat-management SC Awards Winner: Best CTEM Solution – Reach Security – Garrett Hamilton – SCA26 #1 Mike Shema March 27, 2026 Read More Read more about SC Awards Winner: Best CTEM Solution – Reach Security – Garrett Hamilton – SCA26 #1
OWASP Gen AI Security Project RSAC 2026 – Scott Clinton – RSAC26 #6 aiml application-security devsecops OWASP Gen AI Security Project RSAC 2026 – Scott Clinton – RSAC26 #6 Mike Shema March 26, 2026 Read More Read more about OWASP Gen AI Security Project RSAC 2026 – Scott Clinton – RSAC26 #6
The Making of Midnight in the War Room – Mickey Bresman – RSAC26 #4 incident-response leadership The Making of Midnight in the War Room – Mickey Bresman – RSAC26 #4 Mike Shema March 26, 2026 Read More Read more about The Making of Midnight in the War Room – Mickey Bresman – RSAC26 #4
Maximizing the Safe Usage of AI Starts With Observability – Pete Constantine – RSAC26 #6 Uncategorized Maximizing the Safe Usage of AI Starts With Observability – Pete Constantine – RSAC26 #6 Mike Shema March 25, 2026 Read More Read more about Maximizing the Safe Usage of AI Starts With Observability – Pete Constantine – RSAC26 #6
Authenticated, But Not Verified: The Workforce Identity Gap – Aaron Painter – RSAC26 #6 identity phishing Authenticated, But Not Verified: The Workforce Identity Gap – Aaron Painter – RSAC26 #6 Mike Shema March 25, 2026 Read More Read more about Authenticated, But Not Verified: The Workforce Identity Gap – Aaron Painter – RSAC26 #6
Post-Quantum Compliance Starts in Your Containers, and Sooner Than You Think – George Manuelian – RSAC26 #6 Uncategorized Post-Quantum Compliance Starts in Your Containers, and Sooner Than You Think – George Manuelian – RSAC26 #6 Mike Shema March 25, 2026 Read More Read more about Post-Quantum Compliance Starts in Your Containers, and Sooner Than You Think – George Manuelian – RSAC26 #6
Why Proactive Security Is Far Better Than Patching – Erik Nost – ASW #375 risk-identificationclassificationmitigation Why Proactive Security Is Far Better Than Patching – Erik Nost – ASW #375 Mike Shema March 24, 2026 Read More Read more about Why Proactive Security Is Far Better Than Patching – Erik Nost – ASW #375