DEV Community

mathew profile picture

mathew

404 bio not found

Joined Joined on 
How to Use Extended Security Posture Management (XSPM) for Continuous Security Validation

How to Use Extended Security Posture Management (XSPM) for Continuous Security Validation

Comments
6 min read
Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Managing Third-Party Cloud Risks in Utilities: CASB Approaches That Work

Comments 1
5 min read
Payment Data Security in Retail: The Importance of a Compromise Assessment

Payment Data Security in Retail: The Importance of a Compromise Assessment

Comments 1
5 min read
Defending the Energy Sector Against Cyber Espionage with Tailored Network Security Solutions

Defending the Energy Sector Against Cyber Espionage with Tailored Network Security Solutions

Comments
6 min read
Protecting Your Data with Advanced Disaster Recovery Solutions

Protecting Your Data with Advanced Disaster Recovery Solutions

Comments
5 min read
The Future of Third-Party Risk Management: Trends and Advancements

The Future of Third-Party Risk Management: Trends and Advancements

1
Comments
5 min read
How to Integrate Cloud Security Tools into Your Existing IT Infrastructure

How to Integrate Cloud Security Tools into Your Existing IT Infrastructure

1
Comments
6 min read
The FedRAMP Certification Process: Step-by-Step for Cloud Service Providers

The FedRAMP Certification Process: Step-by-Step for Cloud Service Providers

Comments
5 min read
IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

IoT Security Vulnerabilities in Operational Technology: Addressing the Risks

Comments
5 min read
The Night the Servers Went Dark: How Quantifying Cyber Risk Saved a Business

The Night the Servers Went Dark: How Quantifying Cyber Risk Saved a Business

Comments
4 min read
Ensuring Business Continuity: How Penetration Testing Services Safeguard B2B Operations

Ensuring Business Continuity: How Penetration Testing Services Safeguard B2B Operations

3
Comments 1
5 min read
Strategic Cyber Resilience: Enhancing Business Operations Through OT Security Solutions

Strategic Cyber Resilience: Enhancing Business Operations Through OT Security Solutions

Comments
6 min read
Cybersecurity as a Service (CaaS): Streamlining Protection for the Digital Age

Cybersecurity as a Service (CaaS): Streamlining Protection for the Digital Age

Comments
4 min read
Unlocking the Power of Digital Forensics and Incident Response: Safeguarding Your Organization in the Digital Age

Unlocking the Power of Digital Forensics and Incident Response: Safeguarding Your Organization in the Digital Age

Comments
5 min read
loading...