Author Description

Author Posts

Insider’s threats vs. Access management

By Milica D. Djekic The insider’s threats are a quite big security challenge of today. The best…

Cyber hygiene is everyone’s job

Essentials practices By Pedro Tavares, Co-Founder, CSIRT.UBI With the Internet becoming a giant data container, cybersecurity challenges…

Choosing the right encrypted USB flash drive for your needs

By Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology With all of the hacking, breaching, stealing,…

The perfect storm driving the growth of ransomware

By Antonio Challita, Director of Product Management at cybersight Ransomware is an increasingly growing cybersecurity threat. This…

Filling the Public Relations Void for Security Innovators

Exclusive Interview with Dan Chmielewski, agency principal, Madison Alexander PR, Inc., an InfoSec Focused High Tech Communications…

How consistent security reporting in government could prevent the next wannacry exploit

By Robert Schofield, Senior Solutions Architect, netcentrics and Thomas Cook, Senior Systems Engineer, netcentrics Nearly one year…

Third Party – Minimizing Organizational Exposure by Mitigating the Wild Card in Security Strategies

2019 Shared Assessments Third Party Risk Management Toolkit Helps Organizations Replace FUD with Actionable Insight, Risk Management…

Defense by offense

Purple Team: The Meeting Point of Red and Blue Teams Meet by Maya Schirmann, VP Marketing, XM…

Aligning Cyber security Effectiveness with Core Business Objectives

Cybersecurity programs establish defined goals but lack measurable indicators to gauge effectiveness. by Brian Contos, CISO, Verodin…

Quis custodiet ipsos custodes?

Who watches the watchers? By Dr. Richard Ford, Chief Scientist, Forcepoint Over the last few years, I…

Show Buttons
Hide Buttons