Hacking and Cybersecurity
Trends to Look Out for in 2024 By Yashin Manraj, CEO, Pvotal Technologies For cybersecurity professionals, remaining effective requires staying on top of a constantly evolving arsenal of attack strategies […]
Stop Managing Identities, Segment them Instead
By Sagie Dulce, VP Research, Zero Networks A Brief History of Identity Management For as long as there have been identities, there have been solutions trying to manage them so […]
Enhancing Cybersecurity Defenses: The role of Voice Cloning in Penetration Testing
By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more critical than ever. As organizations are doing everything they can […]
Data Breach Search Engines
Navigating Access and Security in the Stolen Credentials Landscape By Tom Caliendo, Cybersecurity Reporter, Co-Founder at Brocket Consulting LLC In the last few years, an unprecedented number of stolen login […]
Cybersecurity Trends and Predictions for 2024
By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […]
AI is Revolutionizing Phishing for Both Sides. What will make the Difference?
Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal Cybersecurity Evangelist at Fortra AI has always been a lurking […]
Crafting AI’s Future: Decoding the AI Executive Order
By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That every few years, there will be a gifted wizard who […]
Connecting Tech to Black America
By David Lee, Chief Evangelist and Visionary for Tech Diversity As technology rapidly evolves and advances, it can often seem inaccessible and intimidating for the everyday person. For Black Americans […]
The Importance of Cyber Hygiene for Businesses
By Rigo Van den Broeck, Executive Vice President, Cyber Security Product Innovation at Mastercard Cybercrime is set to cost $10.3 trillion worldwide by 2025, and it’s growing fast. It’s a […]
5 Cybersecurity Resolutions for the New Year
By Roger Spears, Schneider Downs Whenever the new year rolls around, resolutions—to achieve a goal, improve a behavior or continue good practices—abound. And, while many resolutions center personal goals such […]
Hybrid Working is Changing How We Think About Security
By Prakash Mana, CEO, Cloudbrink Security will continue to head the list of priorities for CISOs in 2024, but how we secure our enterprises will need rethinking in the face […]
When Security Collides with Customer Impatience
How Biographic and Biometric Information Work as a Team to Solve the Problem By Raj Ananthanpillai, CEO, Trua Online customers don’t take long to get fidgety. They want their transactions […]
DevSecOps Practices for a Secure Cloud
How to start ahead of the curve? By Vishakha Sadhwani, Customer Engineer, Google Cloud In today’s rapidly evolving technological landscape, a strong cultural practice like DevSecOps is essential. It empowers […]
Vendors Beware of the Cybersecurity Audit
By Caroline McCaffery, Co-Founder and CEO of ClearOPS Introduction to Vendor Management Why does every license agreement and data protection addendum, suddenly, include a right for the buyer to perform […]
How One Industry Exemplifies the Importance Of Cybersecurity In Critical Infrastructure Assurance
And What We Can Learn From It By Brian Hesse, Co-Owner, President, and Chief Executive Officer of PerenniAL Summary Cybersecurity professionals, as with virtually every other organizational function, are always […]
ImmuniWeb AI Platform
Attack Surface Management, Dark Web Monitoring, and Application Penetration Testing by Dr. Ilia Kolochenko, CEO and Chief Architect, ImmuniWeb ImmuniWeb SA is a global application security company headquartered in Geneva, […]
SIEM vs XDR: Capabilities and Key Differences
We compare the differences in SIEM and XDR’s respective contributions to security By Aimei Wei, Chief Technical Officer and Founder, Stellar Cyber All enterprises comprise vast webs of interconnected devices. […]
Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do
By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any organization, big or small. Higher education institutions are especially vulnerable, […]
Why Companies Are Still Investing in Tech During an Economic Slowdown
By Luke Wallace, VP of Engineering at Bottle Rocket With rising oil prices, higher interest rates, and an economic downturn plaguing Europe and China throughout 2023, recession is looming in […]
Ditch the Worry – Switch to Secure WhatsApp Alternative
By Nicole Allen, Senior Marketing Executive at Salt Communications Many organisations use WhatsApp for routine business interactions even though it has been designed as a personal and social messaging service. […]
The Role of Endpoint Security and Management In Threat Detection
By Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches originate at the endpoint (servers, desktops, laptops, mobile devices and IoT devices). These […]
You Can’t Prevent Every Attack, But You Can Mitigate the Damage
More than ever, attackers are leveraging compromised identities to carry out cyberattacks. Stopping them is a challenge—but limiting their impact doesn’t have to be. By Grady Summers, Executive Vice President […]
From Edge to Core: Security in the Data Center
By Timothy Liu, CTO and Co-Founder, Hillstone Networks Most organizations recognize the data center as the most essential and critical element of the network. After all, it serves as the […]
The Role of Compliance in Cybersecurity
Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways By Anas Baig, Product Manager, Securiti Cybersecurity is a complicated yet essential system – one that needs […]
For Cybercriminals, the Game is On and They’re Playing to Win
Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom Software Our fascination — and for many, obsession — with sports in […]
The Rise of Crypto Regulations
How to Comply Now, and for the Future By Ben Richmond, CEO and Founder of CUBE Global As cryptocurrency is gradually explored as a mainstream option for payments – with […]
The Numbers Are In: Identity-Based Attacks (Still) Reign Supreme in 2022
By Greg Notch, CISO, Expel The list of challenges security professionals face will not let up, as new threats emerge on a weekly—even daily—basis. Security teams need to stay informed […]
Top Legacy Active Directory Infrastructure Vulnerabilities and How Attackers See Them
By Tammy Mindel, Security Product Manager at Semperis Microsoft Active Directory (AD) has become a highly lucrative target for cyberattackers. That’s no surprise, given the prevalence of the identity service […]
Why Cybersecurity Is Critical for ESG
Cyber-Awareness Can Help Companies Meet Esg Obligations By Shaun McAlmont, CEO, NINJIO One of the most important trends in the private sector—primarily among publicly traded companies, but increasingly among small […]
The Importance of Responsible E-Waste Disposal for Enterprise Cybersecurity
An Outline of the Importance of Proper E-Waste Disposal for Enterprise Best Practices in terms of both CSR and Cybersecurity By Milica Vojnic, Senior Digital Marketing Executive, Wisetek E-waste is […]