Featured
How to Build a Vulnerability Intelligence Pipeline That Doesn't Rely on NIST's NVD
With NIST's National Vulnerability Database now triaging only a fraction of incoming CVEs, security teams must diversify beyond NVD while rethinking patch SLAs and risk scoring.
Five Cyber Luminaries Who Enrich CYBR.SEC.Community
Here are just a few of the voices who inject cutting-edge insights into the community we are building.
CYBR.HAK.CAST Episode 13: Winn Schwartau
Winn Schwartau argues that the biggest threat facing defenders isn’t just technical, but cognitive: overwhelming information flows that push humans into “mental DDoS.” He has introduced the concept of “critical ignoring” as a prerequisite to critical thinking.
CYBR.HAK.CAST Episode 12: Fergus Hay of The Hacking Games
Phil Wylie and Michael Farnum talk with Fergus Hay about how the cybersecurity industry is missing a huge opportunity by overlooking gamers and young, neurodiverse problem-solvers who already have the mindset to become the next generation of ethical hackers.
CYBR.SEC.CAST Episode 66: Wendy Nather
In CYBR.SEC.CAST Episode 66, Wendy Nather explains why cybersecurity’s biggest lessons aren’t coming from breaches, but from the near-misses no one talks about.
CYBR.HAK.CAST Episode 11: Theresa Lanowitz
As AI accelerates development and expands the attack surface, organizations are waking up to a harsh reality: the software supply chain is now their most fragile and least understood security risk.