Author Description

Author Posts

Mid-Market Businesses, Don’t Think Small about Security

By Jake Kiser, CEO, StrongKey Whether in business or cybersecurity, it doesn’t help small businesses to play…

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or…

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. As software becomes more sophisticated, organizations of all sizes…

Open-Source Code

Quick Review of the “Flat map-stream” attack THE SOCIAL ENGINEERING ATTACK Recently, a malicious attacker socially engineered…

9 Ways to Safeguard Privileged User Accounts and Protect Your Business

By Anusha K. Muralidharan, Product Consultant, ManageEngine At Gartner’s Security and Risk Management Summit in June 2019,…

The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense

By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but…

10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider

By Mitesh Patel, Managing Director, Fifosys Do you really need them or can the internal teams deliver…

Cyber-security as a Priority in 2019

Cybersecurity has an increasing impact on the business and future of organizations. By Pedro Tavares, Founder of…

Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution

A cyber threat hunting solution should not simply be another layer of real-time detection. There are significant…

Five Steps to Least Privilege Success

Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist,…

Show Buttons
Hide Buttons