Monthly Archives: October 2023
Achieving Optimal Zero Trust Maturity: The Role of Data and Governance
By Carolyn Duby, Chief Technology Officer, Cloudera Government Solutions The federal government has placed a stronger emphasis on zero trust since OMB’s federal zero trust strategy memo from the beginning […]
Bot Security: The Hunt for Vulnerabilities In The Digital Realm And The Burgeoning Need To Safeguard Users, Businesses, And Global Economies
By Mohit Shrivastava, ICT Chief Analyst, Future Market Insights Bots have incorporated themselves into our online experiences in the ever-expanding digital world. Bots have altered the way we engage with […]
Publisher’s Spotlight: AT&T Cybersecurity: Edge Ecosystem
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding emerging trends, and innovation breakthroughs. The annual AT&T Cybersecurity Insights(TM) […]
Policy: The Silent Sentinel of Your Cybersecurity Defenses
By Craig Burland, CISO, Inversion6 Planning your next move to reinforce the organization’s cyber security posture? Take a moment to look away from that shiny new tool and cutting-edge technology. […]
Transformative Benefits of ML&AI in Cybersecurity
By Gizem Yılmaz, Product Owner, Nextray AI In the modern digital era, the significance of cyber security has escalated. With the growing dependence of businesses and organizations on technology, their […]
Implementing a Modern, Holistic Approach to Tech Sector Security
By Sean Malone, Chief Information Security Officer, Demandbase Technology has given rise to many comparisons in the past few years, but the train comparison is one of my favorites. In […]
Unmasking the AI Flip
Navigating a New Wave of Cyber Threats By Ashley Manraj, Chief Technology Officer, Pvotal Technologies Recent advances in Artificial Intelligence (AI) is positioning it to be the one most disruptive […]
Why Do YOU Need a Risk Assessment?
Identifying Vulnerabilities, Ensuring Compliance, and Protecting Your Business Assets By Dasha Deckwerth, President & CISO, Stealth-ISS Group Inc. The tremendous advances in technology have created a highly connected world. These […]
With Increased Cybersecurity Awareness, Why Does Phishing Still Work?
By Zac Amos, Features Editor, ReHack With the costs of cyberattacks rising and the effects becoming more severe, many decision-makers realize cybersecurity awareness training must be an ongoing part of […]
Why Power Matters in Cyber Protection
Defending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood that as digital evolution continues opening doors for greater […]
The Basics of Digital Forensics
By Milica D. Djekic The digital forensics is a field that assists us to find the clues within a cyberspace regarding some cybercrime or computer breach. The majority of tools […]
The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the rear end mildly crumpled and the hapless driver nowhere in […]
How To Ensure Information Security of An Organization Basing on Business Requirements
By Sergio Bertoni, The Leading Analyst at SearchInform There is a global trend of strengthening the legislation related to the information security related issues. Besides the regulators’ requirements, due to […]
Seeing Through the Vendor Spin: Interpreting the MITRE ATT&CK Evaluation Results
The 2023 MITRE ATT&CK Enterprise Evaluation results were just released and that means one thing – all participating vendors are scrambling to show themselves in the best light possible. This, […]
4 Reasons Why Not to Use Whatsapp for Secure Communications
By Nicole Allen, Senior Marketing Executive at Salt Communications Don’t settle for just using WhatsApp for secure communications. Check out these 4 reasons why you should consider a WhatsApp replacement. […]
The rising role of Digital Risk Monitoring solutions in M&A
Venture Capital Firms and Acquiring Companies: The Blind Spot By Kaustubh Medhe, VP, Research & Threat Intelligence Mergers and Acquisitions (M&A) have become a common strategy for companies to scale, […]
Promoting Safety Across Your Digital Supply Chain
No organisation is an island. Last month’s attack on payroll software Zellis, reminds us how the effects of one breach can very quickly cascade across the business network to third […]
No Cloud, No Problems: Why Dynamic DNS Reigns Supreme Over Cloud Applications
By Dan Durrer, Founder & CEO, No-IP Whether you are gaming with friends or game planning your next business venture, it is likely that you are relying on the cloud […]