top of page
Search


Rethinking Data Security: The Power of DSPM & Vulnerability Management
In this short video, our CISO, Zach Luze, breaks down how DSPM: Maps your sensitive data across repositories Connects with vulnerability...
Jul 171 min read


How CISOs Can Navigate Digital Transformation & Cyber Risk
Graeme Payne, Co-Founder and Senior Partner at TBDCyber, shares his thoughts on how CISOs can navigate digital transformation and cyber risk in this short video.
Jul 101 min read


Thinking About DSPM? 8 Crucial Considerations Before You Buy
Author: Â Zach Luze, TBDCyber CISO and Director of Data and Security Architecture Data Security Posture Management (DSPM) is generating...
Feb 33 min read


Post-Incident Response: Learning and Adapting
Author: Kyle Shubin , Senior Manager TBDCyber Introduction Effective incident management doesn't end with resolving a security breach....
Jun 12, 20244 min read


Timeline Analysis Overview and Its Use In Memory Forensics
Author : Kyle Shubin , Senior Manager Introduction to Timeline Analysis Timeline analysis in digital forensics is a technique for...
Apr 30, 20243 min read


Unpacking the Changes from NIST CSF 1.1 to 2.0
In the ever-evolving cybersecurity landscape, organizations must stay ahead to protect their digital assets and sensitive information....
Jan 20, 20242 min read


Transforming Third-Party Risk Management for 2024Â Â
In the ever-evolving landscape of cybersecurity, it's crucial to ensure that every facet of our defense mechanisms is not just keeping...
Jan 20, 20242 min read


What is on Your 2024 Cybersecurity Agenda?
As technology continues to evolve at a rapid pace, so do the tactics and strategies employed by cybercriminals. In addition to managing...
Jan 20, 20244 min read
bottom of page