Securing Attack Surfaces with Graph Technologies - Tal Morgenstern, Vulcan Cyber
Techstrong TV Interviews
•
01-Jan-1900
Tal Morgenstern, co-founder of Vulcan Cyber, explains how graph technologies will play a critical role in enabling organizations to better secure ever-expanding attack surfaces that are becoming more challenging for cybersecurity professionals to discover and protect.
Up Next in Techstrong TV Interviews
-
PBOM: Illuminating Software Supply Ch...
SBOM is a critical step for software supply chain security, but it is only the second act in a five-act play. SBOM is a static list of the name, version, license, and any vulnerabilities of open-source components used to develop and build a piece of software. It is important for quality control a...
-
Developer-Led Landscape: Secure Softw...
Dell Technologies Capital managing director Tyler Jewell released his latest in-depth report on the developer market, “Developer-Led Landscape: Secure Software Supply Chain.” The report includes observations and industry insights from a curated database of 1,500 companies whose products are sold ...
-
AWS Vulnerability: Unveiling the Uniq...
Or Aspir, head of research for Mitiga, explains how a vulnerability found in Amazon Web Services (AWS) environments is the latest example of what makes cybersecurity in the cloud so fundamentally different.