The CISO Perspective by TCP Media

  • Home
  • About Us
  • YouTube
  • Articles
  • Contact Us
    • YouTube
The CISO Perspective by TCP Media

|





  • How to Use Canary Tokens for Threat Hunting

    You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…

    January 15, 2025
    Security Concepts, Security Strategy, Security Technologies
  • 2024 Verizon Data Breach Investigations Report: Key Trends and Lessons Learned

    The 2024 Verizon DBIR analyzes over 30,000 security incidents and 10,000 breaches worldwide. Learn the top trends, attack vectors, and actionable takeaways for defending against…

    January 10, 2025
    News, Security Concepts, Security Strategy
  • Next-Gen Firewall Evasion: Five Defensive Techniques

    Introduction So you have this highly sophisticated and powerful firewall on your network with all the bells and whistles turned on. And considering how much…

    January 7, 2025
    Firewall, Security Concepts, Security Strategy, Security Technologies
  • Virtual Network Function (VNF): Five Considerations Before Virtualing Your Perimeter

    VNF, or Virtualized Network Function, refers to the process of virtualizing traditional networking and security functions into services. In practical terms, this means running several…

    December 7, 2024
    Cloud, Firewall, Security Technologies, Sizing
  • 5 Steps To Securing Your SD-WAN

    Gartner predicts that by 2023, 93% of organizations will be doing some form of SDWAN for the WAN edge. And the reasons for this disruption…

    November 7, 2024
    Secure Networking, Security Concepts, Security Strategy
  • ATT&CK Matrix: The Enemies Playbook

    The ATT&CK framework developed by MITRE expands on the last three steps of the kill chain by giving us twelve more granular categories to replace…

    October 3, 2024
    Security Concepts, Security Strategy
Prev
1 2 3 4 5 6
Next

About the ciso perspective

The CISO Perspective is a thought leadership platform focused on demystifying complex topics in cybersecurity, AI, and emerging tech. With decades of hands-on experience leading product and security teams, we deliver clear, actionable insights through videos, blogs, podcasts, and more..

Subscribe for updates

Join our mailing list and get notified when we release new episodes and blog posts. No spam, we guarantee.

YouTube

Apple Podcast

Spotify

RSS

  • Subscribe Subscribed
    • The CISO Perspective by TCP Media
    • Already have a WordPress.com account? Log in now.
    • The CISO Perspective by TCP Media
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar