As DOD formally extends Zero Trust principles into operational technology environments, agencies must secure machines, sensors and industrial systems without compromising availability or safety.
In July 2025, the Department of Defense issued Directive-Type Memorandum 25-003, formally advancing implementation of the DOD Zero…
How the Industry Is Framing AI
Over the past two years, artificial intelligence has moved from an emerging capability to the dominant narrative in cybersecurity. Nearly every category, from endpoint protection to identity platforms to cloud security, now highlights AI-driven features promising…
Financial services institutions possess vast quantities of valuable data about customers. Naturally, this makes them targets for cyberattackers who seek to pilfer data, extort organizations, and commit cyber fraud.
One solution that has proved to be a big help in extending cyberdefenses and…
In higher education, reputation is essential, and nothing shatters a good reputation faster than a high-profile cybersecurity attack that compromises the personal data of students and staff or steals other sensitive or legally protected information. Compounding the challenge of thwarting cyberattacks…
I, like my colleagues and probably many of you as well, have developed some go to moves and tricks to deal with learning new skills, “swimming pool, wall-hugging tactics,” so to speak. Only this time, they are keeping me safe while learning…
If Brazilian Jiu-Jitsu (BJJ) teaches you anything, it’s how out-of-shape you are. After every class, I feel like a tub of butter poured on a bed of uncooked cookie dough. It’s supposedly part of the transformation efforts that takes place as you…
The night before my son was released from the hospital, I dropped by and signed-up for a three-day tryout. I was hooked after my first class.
