Digital Accessibility and Cybersecurity Must Go Hand in Hand
By Dr. Chris Olson In an Increasingly Digital World, Accessibility and Cybersecurity Have Emerged as Significant Factors for Both Individuals and Organizations. Digital accessibility refers to the design and development […]
Defending Beyond 9-to-5: BlackCloak’s Fortress for Executives’ Digital Sanctuaries
by Annabelle Klosterman, Cybersecurity Reporter, Cyber Defense Magazine Overwhelming would be an understatement while walking through the 2023 BlackHat USA’s business hall. They featured over 440 of the industry’s leading […]
How to interpret the 2023 MITRE ATT&CK Evaluation results
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted than the […]
An Interview with Dasha Deckwerth – Stealth ISS Group
Webinar: Leveraging the Power of Cyber Threat Adversary Infrastructure
Mastering Patch Management: 10 Essential Best Practices for Optimal Security
What is patch management and why is it important? Software development is a continuous process, whether it involves creating a Windows Server or a simple text editor. Vendors release functional […]
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity Need to Change
by Ms Camellia Chan, Founder and CEO of Flexxon Shark nets have a notorious reputation: for failing at doing its intended job, giving a false sense of security, and causing […]
Top 100 Women in Cybersecurity
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai https://www.linkedin.com/in/hong-jia-02234654/ Assurant Marilyn Piccolo https://www.linkedin.com/in/marilyn-piccolo-777a728/ Attivo Networks Sarah […]
Top 100 CISOs
These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the most innovative, with unparalleled success in communicating with their boards […]
Top 100 Cybersecurity Startups
10dot https://10dot.com/ Acronis https://www.acronis.com/ Alertot https://www.alertot.com/ Aqua https://www.aquasec.com/ Argus Security https://www.argussecurity.it/ Augmenta Cyber Security https://augcyba.com/ Auth0 https://auth0.com/ Authomize https://www.authomize.com/ Axis Security https://www.axissecurity.com/ Axonius https://www.axonius.com/ Axur https://axur.com/ Balbix https://www.balbix.com/ Black […]
Moola Market Manipulation
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on the Celo blockchain – suffered […]
Managing Cybersecurity for Critical National Infrastructure
General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality of managing a cybersecurity program […]
Remote Workers Face Growing Threats from Phishing Attacks
Analysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies have reorganized the workplace forever, […]
Infrastructure-as-Code Security: a Critical Responsibility
By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been established for over half a […]
Mobile App APIs Are Crucial to Businesses – But Are Under-Protected
The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App and Data Protection. By David […]
How To Reduce Rising Cyber Insurance Costs When You Have a Remote Workforce
By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches become commonplace, insurers are running […]
How Does a Botnet Attack Work?
By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet attacks among classic ransomware and […]
How 5G Networks Are Secured and Enabled By SASE
By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment and security considerations. While still […]
The Rise in Cyber-Attacks from Bad International Actors
There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By Scott Bledsoe, CEO, Theon Technology […]
Five Ways to Keep Endpoint Protection Simple
By Ashley Leonard, CEO, Syxsense Endpoint security continues to be more challenging and complex as workplace environments hybridize and evolve. In fact, research shows that 68% of organizations have experienced […]
Doenerium: When Stealing from Thieves Is Also a Crime
By Igal Lytzki, Incident Response Analyst, Perception Point Over the past few weeks our team of ‘white hat’ cyber threat experts uncovered a particularly worrying and sophisticated phishing attack that […]
DevSecOps and Digital Transformation: Bridging the Security Gap
How DevSecOps Ensure Security in Development Lifecycle? By Sudeep Srivastava, CEO, Appinventiv The Covid-19 pandemic has accelerated digital transformation to a staggering speed. However, for most organizations going digital has […]
As Online Threats Facing Businesses Grow, Companies Must Bolster Their Cybersecurity Posture
By Jonathan Goldberger, SVP Security Practice, TPx The increasingly dangerous security landscape is particularly concerning to businesses, as they face increasing cyberattack threats. Instead of fearing the unknown, business owners […]
Why Defensive Superiority Should Rein Over Offensive Capability
By Marcus Fowler, SVP of Strategic Engagements and Threats at Darktrace Amid a near-constant cycle of cyber incidents globally, organizations and institutions in both the private and public sectors must […]
Compliance Is the Key to Unlocking Government Contractor Success
By Dan Firrincili, Senior Manager, Product Marketing at Deltek In 2021, President Biden signed the Cybersecurity Executive Order 14028 into law, establishing new security standards for software that the government […]
Applying the NIST Framework to Ransomware Risk Management
Top Takeaways for Preparing for and Managing a Ransomware Attack with NISTIR 8374 By Gil Kirkpatrick, Microsoft MVP and Chief Architect, Semperis Your organization likely adheres to at least some […]
Cyberattacks Remain on the Rise – How Can the Corporate World Remain Proactive?
By Geoffrey Lottenberg Imagine a swarm of termites secretly and incessantly feeding on your home. In relative silence, your home is under attack, 24 hours a day. By the time […]
Cyber Threats Driving Insurance Claims Activity
By Scott Sayce, Global Head of Cyber and Group Head of the Cyber Centre of Competence at Allianz Global Corporate & Specialty (AGCS) Cyber Threats Driving Insurance Claims Activity In […]
Common Vulnerabilities of Enterprise Web Security That Demands Your Attention
By Eden Allen, Cyber Security Educator, CheapSSLWeb Years ago, the way leading enterprise-level concerns were viewed differed from how it is viewed today. As enterprise companies started taking on the […]