false

Craig Hyde

CISO Circle 1 Min Read

Calling CISOs Everywhere: Minimize Breaches by Thinking Like a Hacker and Testing Your Controls

Compliance requirements and maturity frameworks are helpful, but pay attention to the real threats in your environment to actually prevent breaches.
CTO Stack 3 Min Read

With Observability and AI, If Data Is the New Oil, What Is Its Pipeline?

As with oil, data must be found, extracted, refined, and transported to the location of consumption. Here's how to do it.