Do You Talk About Things Like…
DevSecOps, AI/ML Ops, cloud automation, IaC, CI/CD, pet-grooming for developers, SOAR, Kubernetes, Salt Project, making the perfect whiskey sour, cybersecurity automation, and software engineering?
Yes. And a whole lot more.
Sort By
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- September 2022
- August 2022
- April 2022
- March 2022
- November 2021
- April 2021
- August 2020
- June 2020
- May 2020
- January 2020
- November 2019
- September 2019
- August 2019
- May 2019
- January 2019
Leveraging Threat Intelligence Databases
Are you taking advantage of the powerful data available in threat intelligence databases as part of your overall defense strategy? If not, read on to find out how they can help keep you ahead of bad actors.
Automating Threat Intelligence: A Strategic Approach to Data Movement
Author: Nicholas M. Hughes
Want to strengthen your cybersecurity defenses? It's time to harness the full potential of your data through a data-centric approach in threat intelligence.
Unlocking Efficiency: 10 Automation Projects to Transform Your Operations
Author: Nicholas M. Hughes
Does your organization need to do more with less? Who doesn’t? IT budgets are facing cuts and staffing levels are often lower than many industry professionals believe is necessary to fulfill their mission. So what can you do to get the job done with fewer people and less money? Automate All the Things.
Bridging the Cybersecurity Skills Gap: The Untapped Potential of Upskilling
Author: Nicholas M. Hughes
In the bustling realm of cybersecurity, a peculiar paradox has emerged. On one side of the chasm, there's a palpable shortage of seasoned professionals; on the other, a brigade of eager novices is ready to dive into the digital trenches, albeit sans experience.
ChatGPT and Cybersecurity: Is the Popular AI a Threat?
Author: Nicholas M. Hughes
Yes, ChatGPT is a valuable tool. But is your team using it responsibly? Here’s what you need to know to harness its power without compromising security.
Video: How Will AI Influence Recruiting and HR?
How can we harness AI for the mutual benefit of job candidates and recruiters?
In the most recent episode of the EITR podcast, we sat down with expert recruiter Ross Hecox from @scuttlegov8213 , delving into the realm of artificial intelligence's role in Human Resources.
Video: Women in STEM talk about being women in STEM
What does the future hold for women in STEM?
Join our Chief Community Officer, Judy, and our talented 2023 summer intern, Natalie, as they share their perspectives alongside Stephanie in this engaging and lively episode of the EITR podcast.
Cybersecurity Tall Tales Small Businesses Need to Debunk
Author: Nicholas M. Hughes
There's a genre of cybersecurity folklore that's as persistent as it is misleading. These myths have somehow woven their way into the fabric of small business operations, leading to misguided decisions and risky practices.
Securing the Digital Metropolis: 7 Pillars of Security Automation
Author: Nicholas M. Hughes
Security automation tools are not merely impressive; they are essential for building a resilient and secure enterprise.
Video: Is cybersecurity a parfait or an onion?
Tom McNamara, CEO of Hopr, sat down with us to chat cybersecurity predictions and Hopr’s novel Zero Trust automated moving target defense. Yep, the future is here, folks.
What’s the impact of AI on cybersecurity?
Author: Nicholas M. Hughes
Is AI the future of cybersecurity automation or just another buzzword?
A Very Particular Set of Skills: Hiring in Cybersecurity
Author: Nicholas M. Hughes
When building a cybersecurity team, you want to look for people who possess a particular set of skills. You know, Liam Neeson in “Taken” type of skills.
DevSecOps: A Match Made in Cybersecurity Heaven
Author: Nicholas M. Hughes
We've all heard the adage, "the best defense is a good offense”…
Cybersecurity in 2023: How to Stay Competitive
Author: Nicholas M. Hughes
Welcome to the future!
Why Automate Cybersecurity?
Author: Nicholas M. Hughes
Ladies and gentlemen gather round, for I have a tale to tell. A tale of woe and despair, of firewalls and phishing scams. But fear not…