Monthly Archives: March 2023
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and the break-neck pace that […]
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing from month to month […]
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert Herjavec, CEO, Cyderes The […]
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk by By Eyal Gruner, […]
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet CISOs frequently find themselves […]
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and applications – all of […]
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries, but it can be particularly challenging in environments of high […]
Why You Can’t Have True Zero Trust Without API Security
By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason. Due to organizations’ embrace of digital business models and enablement […]
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions need to share data, […]
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches end up in loss […]
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight to secure sensitive data against future cyber-attacks from quantum computers. […]
Vulnerability Prioritization is Not a One-Size Fits All Approach
By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging technologies are implemented. Security professionals struggle to keep up with […]
Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the cloud, the security of these digital assets has been a […]
There’s no way you’re still using Consumer Messaging Apps for Business
By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they were intended for personal usage. However, because of the legal […]
Stop Backing Up Ransomware
By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment. However, having good backups has been a […]
The WAN Under Siege
WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats against the modern wide area network. By Greg Bryan, Senior […]
“The Impact of Mobile Threats on SMBs: 10 Simple Ways to Empower Your Company.”
By Wendy Taccetta, SVP, Small and Medium Business for Verizon Business The shift in our hybrid and remote working world and the increase in mobile device use allow for a […]
The California Consumer Privacy Act (CCPA) and the American Data Privacy Protection Act: The Good, The Bad and The Ugly
By Dr. Eric Cole, Advisor – Theon Technology Since 2018, there has been serious discussion of a new national privacy law promising Americans enhanced data protection, much like the European […]
The Biggest Cyber Threats For The Financial Industry In 2023
By Ben Herzberg, Chief Scientist of Satori According to external market data, the financial sector was the most attacked in 2022 by DDoS attacks, while the number of all attacks […]
Solving The AppSec Dilemma Across the Entire SDLC
Why organizations should adopt an integrated and continuous approach to application security education By Amy Baker, Security Education Evangelist, Security Journey The software supply chain is under increasing threat. With […]
Sell tickets to Fans, Not to Bots.
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event only to discover they are […]
Securing Collaboration at the Speed of Business
By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote or hybrid work. And Slack […]
Product Review of Specops Password Policy
Looking for a tool to validate if your Active Directory (AD) passwords are safe across your Enterprise? Why would this be important? There are a few solutions in the industry […]
Passwordless: Fact Versus Fiction
By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause, security teams are seeking password alternatives to help enhance their […]
Our Nation Needs Comprehensive AI Legislation, And Soon
By Dr. Allen Badeau, Chief Technology Officer, Empower AI The White House recently launched an “AI Bill of Rights” framework to lay the groundwork for the future creation and use […]
Lessons From the Uber Hack
By Tomasz Kowalski, CEO and Co-Founder, Secfense For decades, cybersecurity experts have been warning us against weak or stolen passwords. Two-factor authentication (2FA) has always been pointed out as the […]
Industry Experts Share Their Security Predictions for 2023
Insights on the trends all businesses need to look out for By Multiple Authors It’s no surprise that security is a major topic of conversation, with cyberattacks of all kinds […]
How Zero Trust Enables More Effective Security Management
Moving to Zero Trust Architecture as a standard By Jim Hietala, Vice President of Business Development and Security at The Open Group There’s a huge buzz around Zero Trust in […]
How to Stay GDPR Compliant While Sending Cold Emails
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important marketing technique for any business that depends on reaching new, […]
Has Adoption of ‘Connected Devices’ Outpaced Security?
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of connected devices but the speed at which these devices have […]