In a conversation with Partners Michael Gurau and Swope Fleming, along with Director Micah Gertson, the three discuss these dynamics and focus on news of leading automakers producing their own chips to optimize value for their specialized needs and reduce supply chain exposure.
Partners Michael Gurau and Ben Matthews, CISO Matthew Rosenquist, and entrepreneur, author, and privacy expert Michelle Dennedy, discuss how organizations can navigate the inherent complexity in balancing cybersecurity, data management, and privacy.
Google, Amazon, Microsoft, Meta (Facebook), and Apple (GAMMA) have diversified and blended business models to deliver unique solutions.
In the third episode on building a cybersecurity strategy playbook, Partners Michael Gurau and Ben Matthews, along with CISO Matthew Rosenquist, discuss how to translate insights and analysis on the threat, technology, and business landscape into an actionable cybersecurity strategy that is comprehensive, consistent, and sustainable.
The second episode in our series on building a cybersecurity strategy playbook breaks down how to synthesize insights on the threat landscape, competitors, and technology solutions and identify potential remedies.
The first episode in our three-part series on building a cybersecurity strategy playbook breaks down how enterprises and tech vendors drive insight into the threat landscape, technology solutions, and their internal present state of readiness.
Partners Michael Gurau and Swope Fleming discuss the impact of funding, consolidation, and supply chain challenges on both established and emergent players in the semiconductor industry.
Our third episode of the Attacks Deconstructed series breaks down a nation state's attack on Microsoft Exchange servers, impacting thousands of US companies.
In the latest episode of Attacks Deconstructed, Partner Ben Matthews and CISO expert Matthew Rosenquist deconstruct the recent Colonial Pipeline attack.
In the Attacks Deconstructed podcast series, Partners Michael Gurau and Ben Matthews, along with cybersecurity expert and CISO Matthew Rosenquist break down recent cyberattacks to understand the attacker, goals, methods, and targets of the attack.