Author Description

Author Posts

For better protection, stop buying security products

by Stan Black, Chief Security, and Information Officer, Citrix Do the security products you’re buying make you…

Attivo Networks and Deception Market Overview

Why Threat Deception Technology Adoption is Soaring by Carolyn Crandall, Chief Deception Officer, Attivo Networks Attivo Networks…

The Impact of the Marriott Breach and Chinese Mass Surveillance

Lessons Learned from the Recent Marriott Breach by Richard Blech, Founder & CEO at Secure Channels Inc….

Why Major Data Breaches Will Continue in 2019

Confidential Database Data is at Risk to Data Theft by Hackers by Randy Reiter, CEO, SQL Power…

Thanks to Human Expertise, Companies Are Stopping Phishing Attacks in Minutes

by Tonia Dudley, Security Solution Advisor, Cofense In a recent 60 Minutes interview, Tesla founder Elon Musk …

Fraud Protection and AI in The Financial Markets

The ‘Black Box’ Problem of AI by Davide NG Fania, MD, XTN Cognitive Security Powerful machine-learning techniques…

CSIOS Corporation: Scaling New Heights of Cyber security Services

By Cesar Pie, President, and CEO of CSIOS Corporation Home to the U.S. Cyber Command, the National…

Zero Trust? Not if you’re Surfing the Web

Reshaping the Security Landscape by Daniel Miller, Senior Director Product Marketing, Ericom Software Though it may come…

Winning The Battle for the Inbox

by John Randall, VP Product Management, EdgeWave Winning the battle for the inbox For virtually everyone, email…

Threat Intelligence: Data Driven Security

by Liejun Wang, director of 360 threat intelligence center, 360ESG Gartner’s definition of threat intelligence is as…

Show Buttons
Hide Buttons