Monthly Archives: February 2023
Busting Myths Around Cybersecurity Team Training
New Research Results from Omdia and Cybrary Point to Substantial ROI From Continuous Upskilling of Cybersecurity Teams. By Kevin Hanes, CEO, Cybary In recent years, cybersecurity has garnered a staggering […]
2023 Predictions
By Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on technology, 2022 was a chaotic year. This turmoil was partly […]
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
By Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity risk management plan. Cyberthreats have always been creative, but increasing attacks requires […]
The Future of Online Privacy
By Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed that there’s a lot of bad news about online privacy these days. Security breaches and data leaks are everywhere, […]
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue
By Ben Brigida, Director, Security Operations, Expel If you want to know what’s happening in the cybersecurity world, it helps to have up-to-date information. That means staying on top of […]
4 Key Security Trends For 2023
By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has unfortunately failed to live up to hopes for calmer waters. While it seems as though the worst effects of the […]
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget
By Anurag Lal, CEO and President of NetSfere No one expects a hostage takeover, ever. Businesses never think a ransomware attack could happen to them, and yet it very well […]
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […]
SMB Cyber Insurance: The End of Innocence
By Nadav Arbel, Co-founder & CEO, CYREBRO The cyber insurance landscape has changed dramatically in recent years – for both insurers and policyholders. In many ways, the past two years […]
Why Low-Code AI Is Needed Now More Than Ever
By Solomon Ray, Director of Innovation, Strategy, and Special Projects at Iterate.ai As a business leader and executive, a “low-code strategy” may not be on the top of your mind, […]
Why Finding The Right Load Balancing Solution Is Crucial For Hybrid Cloud
By Jason Dover, VP of Product Strategy at Progress In today’s competitive landscape, every business seeks to find ways to carve advantages that give them a small edge over their […]
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the face of modernizing adversaries despite rising breach numbers. The survey […]
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud
By Alisdair Faulkner, CEO at Darwinium Cybersecurity and fraud teams have been locked in a technology arms race with their adversaries for years. Once again, they are on the back […]
Virtual Security and why it matters so much to SMEs
By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of cyber criminals targeting small to medium-sized businesses (SMEs) – many […]
Cyber Defense Magazine– PQC & Biometrics
Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying that passwords have now become obsolete – they can be […]
Top 100 Women in Cybersecurity
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […]
Top 100 CISOs
These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […]
Top 100 Cybersecurity Startups
10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […]
User Behavior Analytics in Case Management
By Milica D. Djekic, Independent Researcher from Subotica, the Republic of Serbia. Abstract: Some criminology studies suggest crime can be committed by coping with some schemes, plans or patterns as […]
Upskilling And Automation The Keys To Cyber Resilience For Businesses
Why investing in cybersecurity measures is more important than ever, despite challenging economic times By Achi Lewis, Area VP EMEA, Absolute Software At a time where cybercrime is on the […]
Unwitting Insider Threats Remain A Challenge As Security Solutions Struggle To Keep Up
By Chip Witt, Vice President of Product Management at SpyCloud Ransomware continues to be a rising and persistent threat to organizations, with research showing that 50% of organizations have been […]
Understand And Reduce The Sap Attack Surface
By Christoph Nagy, CEO & Co-Founder, SecurityBridge Knowing the attack surface in today’s world is very important to reduce the risk of exploitation of the so-called unknown-unknown. Zero days are […]
Typical Cybersecurity Methods Aren’t Enough to Support the Modern Workforce
By Gee Rittenhouse, CEO, Skyhigh Security It’s time to adopt a zero-trust approach. Organizations in all sectors are adopting the hybrid workforce model, and this is forcing a shift in […]
The Top 10 Predictions For The Cybersecurity Industry In 2023
By Christopher Prewitt, Chief Technology Officer, Inversion6 Technology never stops moving forward. Each new year brings changes which create downstream effects on how we are attacked and how we defend […]
The Quantum Threat: Our Government Knows More Than You Do
By Skip Sanzeri, COO and Founder, QuSecure, Inc. Quantum computers are extremely powerful machines that utilize subatomic properties providing amazing potential to change the way that we process information and […]
The Psychology Behind Spear Phishing Scams
By Dr. Yvonne Bernard, CTO, Hornetsecurity Criminals are increasingly using fake emails to exploit their victims for financial gain and are using spear phishing takes the well-known social engineering scam […]
The Importance To Provide Buyers And Sellers Secure, Convenient, And Frictionless Payment Experiences
By Héctor Guillermo Martínez, President GM Sectec The COVID-19 pandemic accelerated the adoption of digital payments globally and especially in Latin America and the Caribbean, as buyers and sellers continue […]
The Benefits of eBPF for API Security
By Sanjay Nagaraj, Co-Founder & CTO of Traceable AI You might hear the term “eBPF” mentioned when chatting to DevOps and DevSecOps folks about network, infrastructure or security management. eBPF […]
NetFlow’s Dirty Little Secret
By Mark Evans, VP Marketing, Endace Many organizations assume their security tools can see everything that happens across the network to detect potential threats. Unfortunately, that’s not the case, for […]
The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
By Dave Adamson, Chief Technology Officer at Espria Encourages businesses to re-claim authority over their networks, thereby enhancing cyber-resilience in the wake of current geopolitical conflicts. It’s no secret that […]