Author Description

Author Posts

Could Censys serve as a threat intelligence collector?

By Milica D. Djekic The fact is so many visible web search engines could offer you a…

Best Practices for Data Protection

By Eitan Bremler, Co-founder and VP of Product, Safe-T As more companies pursue digital transformation, they may…

Mid-Market Businesses, Don’t Think Small about Security

By Jake Kiser, CEO, StrongKey Whether in business or cybersecurity, it doesn’t help small businesses to play…

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or…

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. As software becomes more sophisticated, organizations of all sizes…

Open-Source Code

Quick Review of the “Flat map-stream” attack THE SOCIAL ENGINEERING ATTACK Recently, a malicious attacker socially engineered…

9 Ways to Safeguard Privileged User Accounts and Protect Your Business

By Anusha K. Muralidharan, Product Consultant, ManageEngine At Gartner’s Security and Risk Management Summit in June 2019,…

The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense

By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but…

10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider

By Mitesh Patel, Managing Director, Fifosys Do you really need them or can the internal teams deliver…

Cyber-security as a Priority in 2019

Cybersecurity has an increasing impact on the business and future of organizations. By Pedro Tavares, Founder of…

Show Buttons
Hide Buttons