Reach Security Leader Day: Perspectives from Joshua Jones
A conversation with Joshua Jones, VP of Western Division, Tevora.
Reach Security Leader Day: Panel Discussion
A conversation with Geoff Belknap, Deputy CISO, Microsoft; Raymond Winder, Director of Information Security, Autodesk; Joe Masud, VP of Cyber Security & Engineering, Aristocrat; and Barmak Meftah, Co-Founder & General Partner, Ballistic Ventures.
Reach Security Leader Day: Panel Discussion
A conversation with Geoff Belknap, Deputy CISO, Microsoft; Nicole Perlroth, New York Times Bestselling Author; and Colt Blackmore, Co-Founder & CTO, Reach Security.
Reach on The RSnake Show Demo Day
Trey Ford and RSnake did a great demo day with Reach Security. It blew what little hair RSnake has left back. A person-based risk approach to IT governance and control? Who would have thought of such a thing? Definitely worth a watch if you control security at a large organization.
Reach on NYSE TV
Reach Security CEO & Co-Founder Garrett Hamilton sits down with Trinity Chavez of the NYSE to explore how Reach takes organizations from “architecture to action” with Zero Trust.
What is Security Optimization? How to Find Gaps in Your Stack
True security optimization isn’t about buying more technology; it’s about maximizing the impact of the tools you already have. This means shifting from a reactive, tool-centric approach to a proactive, outcome-driven strategy; one that ensures security investments deliver measurable risk reduction.
What is Configuration Drift? 5 Best Practices for Your Team's Security Posture
Left unchecked, configuration drift increases exposure to cyber threats. Yet, many organizations remain unaware of how much drift has occurred until an audit, incident, or breach exposes the issue. Understanding what configuration drift is, how it happens, and how to prevent it is critical for maintaining a strong security posture.
A Blueprint for Stronger Defenses: MITRE D3FEND
Staying ahead of adversaries is a constant challenge due to the evolving tactics and techniques that they leverage to gain access and achieve their objectives. While frameworks like MITRE ATT&CK have become an industry standard for understanding and discussing adversary behaviors, it can be challenging for defenders to map their own defenses.