Monthly Archives: April 2019

For better protection, stop buying security products

by Stan Black, Chief Security, and Information Officer, Citrix Do the security products you’re buying make you…

Attivo Networks and Deception Market Overview

Why Threat Deception Technology Adoption is Soaring by Carolyn Crandall, Chief Deception Officer, Attivo Networks Attivo Networks…

The Impact of the Marriott Breach and Chinese Mass Surveillance

Lessons Learned from the Recent Marriott Breach by Richard Blech, Founder & CEO at Secure Channels Inc….

Why Major Data Breaches Will Continue in 2019

Confidential Database Data is at Risk to Data Theft by Hackers by Randy Reiter, CEO, SQL Power…

Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes

by Tonia Dudley, Security Solution Advisor, Cofense In a recent 60 Minutes interview, Tesla founder Elon Musk …

Fraud Protection and AI in The Financial Markets

The ‘Black Box’ Problem of AI by Davide NG Fania, MD, XTN Cognitive Security Powerful machine-learning techniques…

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System by Richard Blech, CEO, Secure Channels Inc. ENCRYPTION IS A MUST DEPLOY…

Cyber Investing Summit Returns to NYC on May 16 2019

Explore the Financial Opportunities, Trends and Strategies in the Cybersecurity Sector Key decision makers, investors, and innovators…

Blue Cross of Idaho data breach, 5,600 customers affected

Blue Cross of Idaho announced to have suffered a data breach, hackers accessed to the personal information…

Integris Software 2019 Data Privacy Maturity Study

As compliance related fines escalate, there is a growing amount of visibility and overconfidence among companies on…

Show Buttons
Hide Buttons