Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber Journey

Today’s guest is Den Jones, who’s Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he’s a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.

Should You Trust LLMs with Sensitive Data? Exploring the security risks of GenAI

As more businesses integrate AI into their workflows, it opens the door to unprecedented security and privacy risks. Amidst LLM’s immense power and unmatched capabilities, concerns around security and privacy often take a backseat. While some businesses deliberately ignore privacy concerns, the most common cause of this lack of concern is a gap in understanding the nature of the risks.
Sponsored Post

The Benefits of Managed Security Services and a 24/7 SOC

The security of your enterprise is more important than ever. With the rise in cyber threats, it's essential to have the right tools and strategies in place to protect your business from malicious attacks. One of the most effective ways to ensure maximum protection is by leveraging managed security services and a 24/7 security operations center. Let's break down why this approach can be so beneficial.

11 Tips for Unit Testing in Java

Unit testing is an important part of software development and is considered a crucial step in ensuring the quality and accuracy of the code. It helps in identifying bugs and issues early on in the development cycle, which ultimately results in delivering high-quality software. Java is renowned for being one of the most versatile languages in programming, and it offers a wide selection of unit testing frameworks and tools.

How To Identify a Fake Text Message: AI or Human?

Is it a bot? Or is it a human? Is it texting spam? Or is it a promo message? These are just some of the questions online users ask when navigating websites, notifications, and messages. These questions are not only fair, but they're also necessary. While there are pros and cons to navigating an online world with AI and chatbots, it's essential to know how to spot fake AI communication so you can protect yourself from scammers and cybercriminals.

The Five Key Principles of Modern Application Security

I recently had the pleasure of joining Marina Novikova, partner solutions architect from AWS in a webinar to discuss the key principles for building modern application security programs. We explored the big issues facing AppSec today, and why many companies are taking a new approach. As the world becomes increasingly application-driven, security can no longer be simply a box-ticking exercise for compliance purposes. It must do much more to ensure that software is delivered safely.