Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

80s to AI - Career Talk - Tanium Tech Talks #127

A fire side chat from the heart with Ashley, reviewing 40 years in technology and career advice for uncertain times. What is the meta-narrative of a technology career? How can I differentiate myself in the tech career field? How can I differentiate myself among other job applicants? What is the next fun tech I could tackle? How do you keep a lifelong career fresh and fun? What are my options in a tech career?

Bridging ASPM and Vulnerability Management for Scalable Application Security

In this webinar, "Bridging ASPM and RBVM for Scalable AppSec," security leaders from Cycode and Nucleus explore how to unify application and infrastructure vulnerability management in complex, cloud-native environments.

The Evolution of Identity

From managing simple passwords to securing complex, cloud-native environments, how has identity management really changed? In this thought-provoking discussion, JumpCloud CEO Rajat Bhargava and CTO Greg Keller are joined by Rak Garg (Bain Capital Ventures), and Francis Odum (The Software Analyst) to challenge conventional thinking. They delve into the tension between usability and security, the risks of vendor lock-in, and the urgent need for identity solutions that can bridge the gap between legacy systems and the dynamic demands of cloud-native environments.

Top 5 Proactive Threat Intelligence Use Cases for Enhanced Cyber Defense

In this fast-moving world where businesses operate completely through IT infrastructure, waiting for a threat to happen and finding a solution isn’t enough. There should be a proactive approach, where you spot and remove a threat even before it touches your systems.

Cyber Deception as a Strategic Pillar in Active Defense

The cat-and-mouse game of cybersecurity never stops, and cyber deception in active defense gives defenders a powerful edge. Sun Tzu’s ancient wisdom “All warfare is based on deception” fits modern cyber defense strategies perfectly. Outsmarting adversaries has become just as crucial as blocking them.

Hybrid SOC: The Key to NIS 2 Compliance and MSP Growth

In recent years, cybersecurity regulations have evolved to address more sophisticated cyber threats. In Europe, the NIS 2 directive is increasing pressure on managed service providers (MSPs) to ensure both technical resilience and regulatory compliance. While 78% of private sector leaders believe cybersecurity regulations effectively mitigate risk, many still need support with compliance.

How to Protect Your Business from Scattered Spider's Latest Attack Methods

Mandiant warns that the Scattered Spider cybercriminal group is using “brazen” social engineering attacks to target large enterprise organizations in a wide range of sectors. Specifically, the group targets “organizations with large help desk and outsourced IT functions which are susceptible to their social engineering tactics.” The threat actors impersonate employees and attempt to trick IT workers into granting them access. The group also poses as IT workers to target employees.

The Clock Is Ticking: Why Phishing Remains The Fastest-Moving Cyber Threat in 2025

Cybersecurity professionals face an increasingly aggressive phishing threat landscape, and the 2025 KnowBe4 Phishing By Industry Benchmarking Report makes one thing crystal clear: transforming your largest attack surface - your workforce - into your biggest security asset is critical. 49 Seconds to Disaster According to the Verizon Data Breach Investigations Report (DBIR), the median time it takes someone to click a malicious link is a staggering 21 seconds.

Introducing AI-Driven Policy Management for Better Security

Firewall policy management has reached a critical point, characterized by misconfigurations, overly complex rules, and ongoing audits. The burden continues to fall on already-stretched security teams. For CISOs, the question isn’t whether policies are being enforced; it’s whether they’re aligned, effective, and resilient across every location and environment.