Author Description

Gary M

Author Posts

Is Your Encryption Flexible Enough?

Introducing the XOTIC™ Crypto System by Richard Blech, CEO, Secure Channels Inc. ENCRYPTION IS A MUST DEPLOY…

Cyber Investing Summit Returns to NYC on May 16 2019

Explore the Financial Opportunities, Trends and Strategies in the Cybersecurity Sector Key decision makers, investors, and innovators…

Integris Software 2019 Data Privacy Maturity Study

As compliance related fines escalate, there is a growing amount of visibility and overconfidence among companies on…

U.S. Army Researchers Identify New Way to Improve Cybersecurity

With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last…

What is a Black Unicorn?

In the venture capital industry, a unicorn refers to any tech startup company that reaches a $1…

Five Things You Need to Know About Next-Gen Authentication

by Dana Tamir, VP Market Strategy at Silverfort Currently four out of five breaches involve the use…

Project Beresheet: Unhackable Lunar Module About To Land on Moon

At 3:25pm ET, Project “Beresheet” is about to land on the Moon.  After many years of planning…

The Future of Infosec: Virtualization Will Complement Real-Time Packet Capture

This is the second of two articles on packet capture and its vital role in network cybersecurity. …

Simplifying Cybersecurity Deployments with Automation

Security is a whole lot like quantum mechanics. It’s rife with uncertainty and you can’t observe your…

Packet Capture Technology is Critical for InfoSec and Regulatory Compliance

This is the first of two articles on packet capture and its vital role in network cyber…

Show Buttons
Hide Buttons