Access and download my presentation slides, reports and other relevant resources.
Security Principles For The Proactive Dev
50% of successful cloud attacks start with compromised credentials and phishing. 12% of all data breaches originated from software supply chain attacks.
The White House wants C and C++ dead!
Around 70% of security vulnerabilities stem from
memory safety issues, predominantly found in legacy languages like C and C++. Transitioning to memory-safe languages drastically mitigates these vulnerabilities.
Common API Security Pitfalls and Bad Practices
APIs Are The Second Top Entry Point For Cloud Compromise, At 16.5%.Nearly Half Of Organizations
Identify Managing API Sprawl As Their Top Concern, Followed By Maintaining Accurate Inventory.
Comprehensive Checklist for Securely Deploying AI Systems
Sourced from the Joint Cybersecurity Information report on deploying AI Systems Security, these best practices provide a thorough and detailed checklist for deploying secure and resilient AI systems.
5 expert questions to scrutinize AI claims in cybersecurity solutions
With everyone tossing around the term “AI-enabled” these days, it can be hard to know which cybersecurity solutions truly leverage AI for innovation. Asking one or more of the following questions before or after a demo, may help.
Let's talk
Looking for a dynamic and engaging speaker for your next event or API security expert? Contact me.