Resources \ Newsroom \ Articles

Articles

Take a look at the publications that are featuring articles written by our talented, expert staff.

  • Contact Us
  • Support
  • Resources
Report an Incident
  • About Us
    • Approach
    • Careers
    • Newsroom
    • Leadership
    • Our History
    • Partners
    • Apex Labs
  • Services
    • Overview
    • Managed Services
      • Overview
      • Managed Detection and Response
      • ThreatAdvisor
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
      • Enterprise Security Program
    • Professional Services
      • Overview
      • Security Testing
      • Risk Assessment & Compliance
      • Talent Acquisition
      • Strategy & Planning
    • Services
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
      • Government
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
    • Solutions
  • About Us
    • Approach
    • Careers
    • Newsroom
    • Leadership
    • Our History
    • Partners
    • Apex Labs
  • Services
    • Overview
    • Managed Services
      • Overview
      • Managed Detection and Response
      • ThreatAdvisor
    • Connected Systems
      • ICS / SCADA Real-Time Monitoring
      • Technical Assessment
      • Architecture Review & Assessment
      • Smart Device Testing
      • IoT / IIoT
      • Smart Cities
      • Embedded Systems
      • Enterprise Security Program
    • Professional Services
      • Overview
      • Security Testing
      • Risk Assessment & Compliance
      • Talent Acquisition
      • Strategy & Planning
    • Services
  • Solutions
    • Overview
    • Security Need
      • Overview
      • Application Security
      • Network Security
      • Cloud / Mobility Security
      • Malware
      • Mergers & Acquisitions
      • Peace of Mind / E-Discovery
      • Privacy
      • Protection From Advanced Threats
      • Research, Technology & Validation
      • Skill Set Deficiency
      • Threat Mitigation
    • Security Vertical
      • Overview
      • Aerospace / IFE
      • Automotive / IUE
      • Energy & Utilities
      • Financial Services & Insurance
      • Gaming & Entertainment
      • Healthcare
      • Educational Institutions
      • Retail & Hospitality
      • Technology & Manufacturing
      • Government
    • Security Compliance
      • Overview
      • PCI Compliance
      • CMMC
      • HIPAA / HITECH
      • ISO 27001 / 27002
      • Data Privacy
      • GDPR
      • FCA
      • NCUA / FFIEC
      • NERC CIP
      • FISMA/FedRAMP
      • Enterprise Risk Assessment
    • Solutions
  • Contact Us
  • Support
  • Resources
DirectDefenseDirectDefense
Unmasking the Hidden Dangers of AI in Edge Computing

Unmasking the Hidden Dangers of AI in Edge Computing

Delve into the world of edge computing and AI in this eye-opening article. Jim Broome, President and CTO of DirectDefense explores the limitations of current testing playbooks and the importance of developing AI-assisted tools that address these challenges head-on. Read the full article on AI-Tech Park.  

Cybersecurity Skills Gap: Roadies & Gamers Are Untapped Talent

Cybersecurity Skills Gap: Roadies & Gamers Are Untapped Talent

Gamers and former sound engineers and roadies can help boost the cybersecurity talent pool. Their flexible mindset and attention to detail make them valuable resources. Read the full article by Jim Broome, President and CTO, DirectDefense on Dark Reading.  

The Five Stages of Grief: Coping With a Data Breach

The Five Stages of Grief: Coping With a Data Breach

Have you been a victim of a data breach? You’re not alone. The five stages of grief–denial, anger, bargaining, depression and acceptance–were developed by Elisabeth Kübler-Ross in a book she published called On Death and Dying. Having guided many customers through data breach events to remediation, we’ve seen the “five stages of grief” model in action.… Read more »

Why Cybersecurity is a Blue-Collar Job

Why Cybersecurity is a Blue-Collar Job

Why should we treat cybersecurity as a blue-collar job? The talent gap is evident – more jobs than skilled individuals. A major hurdle is the four-year college degree norm, often failing to equip graduates with hands-on cybersecurity skills. Moreover, the high cost deters young adults. Read DirectDefense President and CTO Jim Broome’s piece where he… Read more »

Application Security Concerns on the Rise, But MSSPs are Here to Help

Application Security Concerns on the Rise, But MSSPs are Here to Help

Amid a growing cyber skills gap, organizations turn to Managed Security Service Providers (MSSPs) like DirectDefense to enhance their cybersecurity posture and resource management. Enterprise Security Tech spoke with Jim Broome, President and CTO, DirectDefense to talk about the challenges around application security gaps and popular attacker tactics. Read the full article on Enterprise Security… Read more »

Article for InformationWeek

ChatGPT Amplifies IoT, Edge Security Threats

ChatGPT can be a useful customer service agent. Unfortunately, customers aren’t the only ones it helps, especially now that ChatGPT sits on many IoT and edge devices. “Existing vulnerabilities, especially in the context of AI and ChatGPT-enabled or assisted attacks against edge devices and users, can be leveraged against businesses in different ways,” says Jim… Read more »

M&A Madness: Overcoming MSSP Integration Challenges Following an Acquisition - Jim Broome - CFH #26

M&A Madness: Overcoming MSSP Integration Challenges Following an Acquisition – Jim Broome – CFH #26

Typically when any merger and acquisition deal occurs, there are bound to be redundancies and overlaps in services, tools and personnel. For MSSPs that find themselves in this situation, it’s important to consolidate and integrate the best of their assets across multiple entities, while maintaining operational consistency. DirectDefense President and CTO Jim Broome shares valuable… Read more »

AI-TechPark Interviews Jim Broome, President and CTO at DirectDefense

AI-TechPark Interviews Jim Broome, President and CTO at DirectDefense

“By leveraging AI, we can provide our customers with several benefits. For example, our MDR solution can quickly and accurately detect and respond to threats, reducing the time it takes to identify and mitigate potential security incidents,” said Jim Broome, President and CTO, DirectDefense. Read Jim’s interview with AI‐TechPark, where he discusses how DirectDefense enhances security… Read more »

Lessons From a Pen Tester: 3 Steps to Stay Safer

Lessons From a Pen Tester: 3 Steps to Stay Safer

From hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data. Read the full article on Dark Reading.  

Enterprise Times News Week of June 5, 2023

Enterprise Times News Week of June 5, 2023

Claroty announced the global expansion of its FOCUS Partner Program with the addition of several Managed Security Service Providers (MSSPs), including IBM, Rockwell Automation, NTT Data, eSentire, 1898 & Co., Atos, Aveniq, Cabrini Technology Group, DirectDefense, Kapsch TrafficCom, and others. Read the full article on Enterprise Times.

DirectDefense Wins 2023 Fortress Cyber Security Award for Incident Response

DirectDefense Wins 2023 Fortress Cyber Security Award for Incident Response

The editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of June 2. This curated list features identity management and information security vendors such as DirectDefense, Dig Security, and more. Read the full article on SolutionsReview.

Jim Broome, DirectDefense: “Many internal security teams struggle to keep pace with the threat environment”

Jim Broome, DirectDefense: “Many internal security teams struggle to keep pace with the threat environment”

Re-establishing security visibility and response capabilities is a significant challenge following the transition to remote work. Relying on conventional security measures such as VPNs is a baseline requirement in an evolving digital landscape. Blind-by-design applications and the migration to working from home are leaving organizations open to attack and intellectual theft by ex-employees. A proactive… Read more »

Red Team Expert Tells IT Brew About the State of the Industry and How Companies Deploy the Service

Red Team Expert Tells IT Brew About the State of the Industry and How Companies Deploy the Service

Companies are using third-party red teams and internal teams alike to find vulnerabilities as soon as possible and the need for red-team services persists. Read what President and CTO of DirectDefense Jim Broome told Eoin Higgins at IT Brew about how companies are deploying this service within their organization. Read the full article on IT Brew.

When ChatGPT Goes Phishing

When ChatGPT Goes Phishing

ChatGPT has become a powerful tool for security professionals seeking to enrich their work. However, its widespread use has raised concerns about the potential for bad actors to misuse the technology. In this article, DirectDefense President and CTO Jim Broome discusses the potential dangers of ChatGPT in the hands of cybercriminals and what it means… Read more »

18 World Password Day Quotes from Industry Experts in 2023

18 World Password Day Quotes from Industry Experts in 2023

For World Password Day, the editors at Solutions Review have compiled a list of comments from some of the top leading industry experts. Here are some simple tips from DirectDefense President and CTO Jim Broome to help you improve your corporate password policy. Read the full article on SolutionsReview.

Article for InformationWeek

Breach Takes Systems Down Across Western Digital

A network security incident took multiple systems offline. Insight has been limited, but the incident gives Western Digital’s customers and other data storage providers plenty to think about. Read what President and CTO Jim Broome had to say. Read the full article on InformationWeek.

Article for The Enterprisers Project

Security Automation: 4 Factors to Consider

Automation can help bolster your organization’s security, but before you talk strategy, you need to talk numbers. Here’s how to start the conversation. Read the full article on The Enterprisers Project.

People on the Move: Christopher Walcutt

People on the Move: Christopher Walcutt

Christopher Walcutt has been promoted to Chief Security Officer at DirectDefense. In this role, Chris is responsible for maintaining consistent information security management throughout the organization. Read more on Denver Business Journal.  

LOAD MORE
  • Home
  • Careers
  • Locations
  • Contact Us
© 2023 DirectDefense - All Rights Reserved    Privacy  //  Site Map     Website by: Fishnet MediaFishnet Media

Find us on LinkedInFind us on LinkedInFollow us on TwitterFollow us on TwitterLike us on FacebookLike us on FacebookRSSRSS

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Privacy Policy SETTINGSACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT