Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS

LIAPP (Lockin App Protector) is an integrated mobile app security service developed by Lockin Company, a Korean-based security company dedicated to mobile apps protection, that protects over 2,000 apps worldwide….

Posted in Featured | Tagged , , , , , | Comments Off on Lockin Company’s Approach to Zero Trust Security and Rising Phishing Threats with its security software LIAPP, LIKEY, and LISS

What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help

On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) reporting rules…

Posted in Featured | Tagged , , , , , , | Comments Off on What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help

Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids

Infrastructure like water system, supply system, telecommunication networks, and power plants are critical assets for any country in that the destruction and incapacity of such systems poses an adverse effect…

Posted in Featured | Tagged , , , , , , | Comments Off on Cybersecurity In Critical Infrastructure: Protecting Power Grids and Smart Grids

The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity

Introduction:  In an era where digital innovation advances rapidly and cyber threats evolve just as quickly, it is crucial for organizations to reassess their security strategies. There is a growing…

Posted in Featured | Tagged , , , , | Comments Off on The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity

Protecting Against Malicious Open Source Packages

What Works and What Doesn’t A software package is the dream of reusability made possible. Individual developers and organizations of all kinds contributed software components to public repositories, in standardized…

Posted in Featured | Tagged , , , | Comments Off on Protecting Against Malicious Open Source Packages

Innovator Spotlight: HUMAN

During my conversation with Lindsay Kaye, VP of Threat Intelligence at HUMAN Security, she emphasized how HUMAN tackles some of the most complex and overlooked threats in today’s digital landscape….

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: HUMAN

Innovator Spotlight: Salt Security

In a world where APIs have become integral to the digital and technical experience, they also represent a significant security risk, often flying under the radar of traditional security solutions….

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Salt Security

Innovator Spotlight: Tanium

During my conversation with Melissa Bischoping, Senior Director of Security & Product Design Research at Tanium, she emphasized how the company addresses the critical challenge of operational risk and security…

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Tanium

Innovator Spotlight: Lineaje

Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving the way of cybersecurity innovation. …

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Lineaje

Innovator Spotlight: Keepnet Labs

Human error remains one of the most significant vulnerabilities in cybersecurity. Despite advances in technology and automated defenses, employees continue to be the primary target for cybercriminals, particularly through social…

Posted in Featured, Spotlight | Tagged , , , , , | Comments Off on Innovator Spotlight: Keepnet Labs

Protecting Your SaaS Applications – A Security Guide

An All-encompassing Approach to Prevent Breaches Organizations depend deeply on technology and data to run their businesses. The recent transition to hybrid and remote working has made companies even more…

Posted in Featured | Tagged , , , , , | Comments Off on Protecting Your SaaS Applications – A Security Guide

Innovator Spotlight: Pentera

Revolutionizing Cybersecurity with Automated Security Validation In a conversation with Jay Mar-Tang, Field CISO at Pentera, it became clear that the landscape of cybersecurity is rapidly evolving. With the increasing…

Posted in Featured, Spotlight | Tagged , , , , | Comments Off on Innovator Spotlight: Pentera

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 remain open for late entries! Winners Announced October 31, 2024...

X