Author Description

Author Posts

9 Ways to Safeguard Privileged User Accounts and Protect Your Business

By Anusha K. Muralidharan, Product Consultant, ManageEngine At Gartner’s Security and Risk Management Summit in June 2019,…

The US Must Catch Up to Other Prominent Powers in Cyber-warfare Defense

By Bryan Becker, DAST Product Manager, WhiteHat Security The terms cyberattack and cyberwar have similar meanings, but…

10 Considerations When Bringing in IT Outsourcing Contractors versus Working with a Managed Services Provider

By Mitesh Patel, Managing Director, Fifosys Do you really need them or can the internal teams deliver…

Cyber-security as a Priority in 2019

Cybersecurity has an increasing impact on the business and future of organizations. By Pedro Tavares, Founder of…

Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution

A cyber threat hunting solution should not simply be another layer of real-time detection. There are significant…

Five Steps to Least Privilege Success

Getting Organizations Started on a Least Privilege Journey to Reduce Risk By Joseph Carson, Chief Security Scientist,…

Five Strategies to Optimize Cloud Security in 2019

By Dannie Combs, CISO at DFIN Article text as more companies move data to the cloud, cybersecurity…

Operational Excellence: The Key to Federal Agencies’ Compliance

By Stan Lowe, Global Chief Information Security Officer, Zscaler In many realms of life, there’s a difference…

What’s next for Cyber-security?

By Min Pyo Hong, CEO, and Founder, SEWORKS What just happened? Unfortunately, many organizations may find themselves…

Putting Security in Context

by Tim Minahan, Executive Vice President of Business Strategy and Chief Marketing Officer at Citrix Innovation knows…

Show Buttons
Hide Buttons