Do You Talk About Things Like…
DevSecOps, AI/ML Ops, cloud automation, IaC, CI/CD, pet-grooming for developers, SOAR, Kubernetes, Salt Project, making the perfect whiskey sour, cybersecurity automation, and software engineering?
Yes. And a whole lot more.
Sort By
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- September 2022
- August 2022
- April 2022
- March 2022
- November 2021
- April 2021
- August 2020
- June 2020
- May 2020
- January 2020
- November 2019
- September 2019
- August 2019
- May 2019
- January 2019
Automating Threat Intelligence: A Strategic Approach to Data Movement
Author: Nicholas M. Hughes
Want to strengthen your cybersecurity defenses? It's time to harness the full potential of your data through a data-centric approach in threat intelligence.
Web Retriever: The New Hero in your Cybersecurity Arsenal
Author: Nicholas M. Hughes
In the realm of cybersecurity and technology, where the Internet is both the battlefield and the prize, a new champion has emerged from the shadows of security automation tools. Meet Web Retriever, an open-source API from Hopr and EITR, that acts as a guardian of the gateway between machine workloads and the vast, chaotic realms of the Internet.
Unlocking Efficiency: 10 Automation Projects to Transform Your Operations
Author: Nicholas M. Hughes
Does your organization need to do more with less? Who doesn’t? IT budgets are facing cuts and staffing levels are often lower than many industry professionals believe is necessary to fulfill their mission. So what can you do to get the job done with fewer people and less money? Automate All the Things.
Bridging the Cybersecurity Skills Gap: The Untapped Potential of Upskilling
Author: Nicholas M. Hughes
In the bustling realm of cybersecurity, a peculiar paradox has emerged. On one side of the chasm, there's a palpable shortage of seasoned professionals; on the other, a brigade of eager novices is ready to dive into the digital trenches, albeit sans experience.
ChatGPT and Cybersecurity: Is the Popular AI a Threat?
Author: Nicholas M. Hughes
Yes, ChatGPT is a valuable tool. But is your team using it responsibly? Here’s what you need to know to harness its power without compromising security.
Video: Women in STEM talk about being women in STEM
What does the future hold for women in STEM?
Join our Chief Community Officer, Judy, and our talented 2023 summer intern, Natalie, as they share their perspectives alongside Stephanie in this engaging and lively episode of the EITR podcast.
Cybersecurity Tall Tales Small Businesses Need to Debunk
Author: Nicholas M. Hughes
There's a genre of cybersecurity folklore that's as persistent as it is misleading. These myths have somehow woven their way into the fabric of small business operations, leading to misguided decisions and risky practices.
Technology Adoption Roadmap for Midsize Enterprises
Author: Nicholas M. Hughes
So, let's dive into the tech world of midsize enterprises…
Cybersecurity Automation: The Art of Teaching Robots to Fight Cyber Villains
Author: Nicholas M. Hughes
Here’s to fighting the good fight – one automated task at a time.
How Cybersecurity Education Turns Click-Happy Colleagues into Human Firewalls
Author: Nicholas M. Hughes
Why sleeping on cybersecurity education is putting your organization’s data at risk.
Securing the Digital Metropolis: 7 Pillars of Security Automation
Author: Nicholas M. Hughes
Security automation tools are not merely impressive; they are essential for building a resilient and secure enterprise.
Video: Is cybersecurity a parfait or an onion?
Tom McNamara, CEO of Hopr, sat down with us to chat cybersecurity predictions and Hopr’s novel Zero Trust automated moving target defense. Yep, the future is here, folks.
What’s the impact of AI on cybersecurity?
Author: Nicholas M. Hughes
Is AI the future of cybersecurity automation or just another buzzword?
A Very Particular Set of Skills: Hiring in Cybersecurity
Author: Nicholas M. Hughes
When building a cybersecurity team, you want to look for people who possess a particular set of skills. You know, Liam Neeson in “Taken” type of skills.
DevSecOps: A Match Made in Cybersecurity Heaven
Author: Nicholas M. Hughes
We've all heard the adage, "the best defense is a good offense”…
Vulnerability Discovery is NOT Vulnerability Management
Author: Nicholas M. Hughes
Knowing that certain packages or areas of your systems are vulnerable means nothing if you don't have a plan to do something with that information.
Cybersecurity in 2023: How to Stay Competitive
Author: Nicholas M. Hughes
Welcome to the future!
Why Automate Cybersecurity?
Author: Nicholas M. Hughes
Ladies and gentlemen gather round, for I have a tale to tell. A tale of woe and despair, of firewalls and phishing scams. But fear not…