Monthly Archives: August 2023
Publisher’s Spotlight: Arctic Wolf: Security Operations Cloud and Concierge Delivery Model
Arctic Wolf is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyberattacks. Our Arctic Wolf Security Operations Cloud ingests and […]
Publisher’s Spotlight: Normalyze: Data Security for Everything You Build and Run in The Cloud
Normalyze is a pioneering provider of data-first cloud security solutions that help global enterprises secure their data wherever it is stored and prevent data breaches. The Normalyze platform uses patented, […]
Publisher’s Spotlight: Cycode: Secure Code to Cloud – Application Security Posture Management (ASPM) at Scale
Cycode’s modern approach to application security enables organizations to effectively secure their cloud-native applications with cost-efficient use of tooling and staff across the SDLC. The Cycode platform makes AppSec tools better […]
Publisher’s Spotlight: CrowdSec: Real-time & Crowdsourced Protection
CrowdSec is a modern, collaborative cybersecurity company committed to proactively safeguarding digital assets. With a growing community of 65,000+ active installations contributing to a robust, constantly-updated global IP reputation database […]
The Shodan as The Scariest Search Engine of Today
By Milica D. Djekic According to many media’s releases – the Shodan is characterized as the scariest searching tool of this modern time. The fact is such a search engine […]
The Other Russian War – What Can We Do?
Russian hacking efforts have highlighted weaknesses in U.S. cybersecurity infrastructure. By Jamie Eiseman, George Washington University Russia is invading Ukraine, and Russian hackers are attacking the United States. In October, […]
Publisher’s Spotlight: ZeroFox: Protecting You Beyond Your Perimeter
Today’s cyber attackers are looking beyond network systems and devices to target organizations through digital platforms outside your perimeter. It’s time to detect, expose, and disrupt these external threats to […]
The Industrial Control Systems and The Internet of Things
By Milica D. Djekic The industrial control systems (ICS) are usually the part of critical infrastructure to every country or nation. These systems have passed through information era and today […]
The Billion Dollar Problem: Securing Business Communication in the Financial Sector
By Anurag Lal, President and CEO of NetSfere Securing business communication in the financial services industry is now more than ever a bottom-line issue. That’s because unsecure business communication creates […]
A Cloud Security Conundrum: Protecting Your Company from Third-Party Software Supply Chain Gaps
By Vrinda Khurjekar, Senior Director, AMER business, Searce The sky is the limit for cloud migration as Gartner predicts that worldwide end-user spending on public cloud services is forecast to […]
Publisher’s Spotlight: Mitiga: The Next Generation of Cloud Incident Response
Cloud and SaaS have become the new nexus for today’s cyber attackers. Are you ready to respond to a breach? Enter Mitiga: Mitiga is the creator of the world’s first […]
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship with the U.S. government and have been a trusted resource […]
SaaS Application Security: Why It Matters and How to Get It Right
Protecting Emerging Startups from Advanced Cyber Threats with Proactive Security Measures By Babar Khan Akhunzada, Founder, SecurityWall Startups are known for their agility, speed, and innovation. They often disrupt entire […]
Our Risk Perception Is Broken How Do We Fix It?
By Miguel Clarke, GRC and Cybersecurity Lead at Armor and former FBI Special Agent I was first introduced to the concept of cyber security in 2000. Back then, the Dallas […]
Publisher’s Spotlight: Oligo: Protect Your Open Source Libraries
Oligo Security is one of the leading open source cybersecurity platforms, pioneering the next wave of application security with a runtime solution that is proactive, effective, and frictionless. Oligo found […]
Protecting Sensitive Information Within Translation
Strategies for Preventing Data Breaches in the Translation Industry By Ofer Tirosh, CEO of Tomedes When it comes to translation, it’s not unusual to come across sensitive information such as […]
An Interview with Dasha Deckwerth – Stealth ISS Group
Penetration Testing- Shielding the Web Content Against Hacking
Penetration Testing Market size worth over $5.5 Bn by 2031 By Aashi Mishra, Sr. Content Writer, Research Nester In January 2023, a news surfaced the internet that 235 million twitter […]
Out from the Shadows: SOC Teams Take Their Seat with the “Superheroes”
By Karthik Kannan, Founder and CEO, Anvilogic Watch any superhero movie and it follows the same playbook: the story revolves around the superhero, at the midpoint of the movie there […]
Publisher’s Spotlight: Black Hat USA 2023 Closes on Record-Breaking Event in Las Vegas
Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful completion of the in-person component of Black Hat USA 2023. The event […]
OT Under Greater Scrutiny in Global Cybersecurity Regulatory Environment
By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s not just information technology (IT) […]
Network Architecture Mapping Improves Security Posture and Saves Big Bucks
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, including the infrastructure and critical data assets, continues to plague […]
Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
Measuring the Effectivity of Security with Data Analysis
By Howie Robleza, Freelance Writer, Avigilon Effective security strategies are fundamental to the success of any business with both physical and cyber security of equal importance. Businesses, even with the […]
Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers
Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there […]
Hybrid Mesh Firewall Management
By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid workforces and cloud networks, there is growing demand to secure […]
Implement Machine Learning to Secure Your IoT Network
By Zac Amos, Features Editor, ReHack Connected devices pose unique security risks and are prone to bot attacks, requiring a tool capable of quickly processing a large amount of information. […]
How We Grew Revenue by Strengthening Cybersecurity
Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about all industries, increasingly concerned about cybersecurity—and for good reason. A […]
Publisher’s Spotlight: THREATX – A Cloud-Native Solution for Runtime API & App Protection
Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)? According to Gartner, by 2025, over 75 percent of organizations will […]
From Passwords to Passkeys – A Passing of the Torch
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those without a password manager to keep track, that’s a prompt […]