Resilient Cyber
Subscribe
Sign in
Home
Podcast
Resilient Cyber
Archive
About
Latest
Top
Discussions
You can't teach someone to swim when they're drowning
An evidence-based case for a Secure-by-Design paradigm shift
Apr 16
•
Chris Hughes
3
Share this post
You can't teach someone to swim when they're drowning
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey
Welcome to Resilient Cyber! If you’re interested in FREE content around AppSec, DevSecOps, Software Supply Chain and more, be sure to hit the…
Apr 13
•
Chris Hughes
35:41
1
Share this post
S6E13: Bryson Bort - Cybersecurity and the Entrepreneurship Journey
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
Leveraging an AI Security Framework
An overview of Databricks AI Security Framework
Apr 11
•
Chris Hughes
4
Share this post
Leveraging an AI Security Framework
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
March 2024
S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge
Thanks for reading Resilient Cyber! Subscribe for free to receive new posts and support my work. Can you each tell us a bit about your background…
Mar 24
•
Chris Hughes
55:55
1
Share this post
S6E12: Matt Nelson & David Cantrell - BESPIN Software Factory - Innovating at the Edge
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos
A deep dive into the chaos and uncertainty involving the NIST National Vulnerability Database (NVD)
Mar 22
•
Chris Hughes
29:18
1
Share this post
S6E11: Josh Bressers & Dan Lorenc - Untangling the NVD Chaos
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
S6E10: Adam Bateman - Securing the Modern Identity Perimeter
Thanks for reading Resilient Cyber! Subscribe for free to receive new posts and support my work. - It is often now said that identity is the new…
Mar 15
•
Chris Hughes
32:07
Share this post
S6E10: Adam Bateman - Securing the Modern Identity Perimeter
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom
Welcome to Resilient Cyber! If you’re interested in FREE content around AppSec, DevSecOps, Software Supply Chain and more, be sure to hit the…
Mar 14
•
Chris Hughes
38:03
Share this post
S6E9: Joanna McDaniel Burkey - From CISO to the Boardroom
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
CISA - Secure Software Development Attestation Final Form
A look at the final version of CISA's Secure Software Development Attestation Form, which will be required for companies to sell software to the Federal…
Mar 13
•
Chris Hughes
4
Share this post
CISA - Secure Software Development Attestation Final Form
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
2
Death Knell of the NVD?
A look at recent concerns around the NIST National Vulnerability Database (NVD) and its implications
Mar 11
•
Chris Hughes
9
Share this post
Death Knell of the NVD?
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
2
OWASP LLM AI Cybersecurity & Governance Checklist
Welcome to Resilient Cyber! Before we dive into the below topic, please be sure to hit the “Subscribe” button. This will ensure you continue to get…
Mar 6
•
Chris Hughes
4
Share this post
OWASP LLM AI Cybersecurity & Governance Checklist
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
S6E8: Erez Yalon - AppSec, Supply Chain and Security Research
Thanks for reading Resilient Cyber! Subscribe for free to receive new posts and support my work. - What are some of the most interesting developments in…
Mar 6
47:17
Share this post
S6E8: Erez Yalon - AppSec, Supply Chain and Security Research
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
February 2024
A Look at the UK's National Cyber Security Centre's Vulnerability Management Guidance
The UK’s National Cyber Security Centre (NCSC) recently published some vulnerability management guidance that has some forward leaning recommendations…
Feb 25
•
Chris Hughes
6
Share this post
A Look at the UK's National Cyber Security Centre's Vulnerability Management Guidance
resilientcyber.substack.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts