Monthly Archives: March 2024
The Balancing Act for Mid-Market Firms: Navigating Digital Growth and Security Hurdles
By Kevin Beasley, CIO, VAI Increased competition and new regulatory requirements are increasing the tempo of digital transformation among mid-market companies. In fact, Deloitte’s 2023 Mid-Market Technology Trend report found […]
The Ethics And Privacy Concerns Of Employee Monitoring: Insights From Data Privacy Expert Ken Cox
By Ken Cox, President of Hostirian Despite the technological advancements brought by automation and the enhanced capabilities of data analytics that have transformed decision-making processes, the digital age has proved […]
Phishing Campaign Exploits Open Redirection Vulnerability In ‘Indeed.com’
By Brett Raybould, EMEA Solutions Architect, Menlo Security Phishing remains one of the most prevalent challenges facing organisations, with more than three billion malicious emails estimated to be sent around […]
Safeguarding the Code That Drives Modern Vehicles
By Soujanya Ain is a Product Marketing Manager at GitGuardian The automotive landscape has evolved dramatically, from mechanical marvels to sophisticated platforms on wheels driven by intricate computer systems. Surprisingly, […]
Do You Know Where Your Data Is? How Law Firms Can Protect Their Most Valuable Asset
By John A. Smith, CSO, Conversant Group If data is the new oil, this holds especially true for law firms as they are wholly dependent on the information they store […]
Building a Secure Data-Protection Infrastructure to Protect against the MOVEit Hack
by Carl Cadregari, Executive Vice President, FoxPointe Solutions Regardless of the industry in which they operate, organizations have likely witnessed the wave of destructive MOVEit breaches sweeping the globe during […]
AI and the Next Wave of Robocalls: Protecting Carriers and Consumers from Sophisticated Voice Fraud
By Tim Ward, Chief Strategy Officer, XConnect Robocalls are relentlessly targeting consumers and causing mistrust for the telecom industry as a whole. This is a problem that is accelerating as […]
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […]
2024 Predictions: The Rise of AI Brings New Security Challenges
By Imperva Executives: Karl Triebes, Lebin Cheng, Peter Klimek, Lynn Marks, and Terry Ray The emergence of generative AI has put new resources in the hands of both attackers and […]
Generative Ai: The Future of Cloud Security
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future of Cloud Security As the digital landscape undergoes a relentless […]
What’s The Role of Gaslighting in The Cyber Security Context of Social Engineering?
By Anna Drescher, Freelance Writer and Mental Health Specialist A few years ago, I received an email from Apple stating that someone had made a purchase from my account. They […]
Bolstering IoT Cybersecurity Amid an Evolving Landscape: A CEO’s Perspective
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key decision makers. This disconnect may be one of the reasons […]