Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Celebrating our 12th Anniversary at RSA conference 2024

It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…

Posted in Featured | Tagged , , , , , | Comments Off on Celebrating our 12th Anniversary at RSA conference 2024

Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

Nick Shevelyov, Senior Executive Reporter, Cyber Defense Magazine On February 7, 2024, the US Government Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory titled “PRC State-Sponsored Actors Compromise and…

Posted in Featured | Tagged , , , , , , | Comments Off on Navigating the Cyber Typhoon: Safeguarding Data Amidst US-China Geo-Political Tensions.

There Are Cyberheroes: THE VIGILANCE MANIFESTO

A Cybersecurity Response Plan with Threat Artificial Intelligence (TAI) Batglitch The Cyber Knight | Data Guardian Vigilante | Coined TAI In the vast expanse of the digital realm, where shadows…

Posted in Featured | Tagged , , , | Comments Off on There Are Cyberheroes: THE VIGILANCE MANIFESTO

Publishers Spotlight: The Syndicate Group (TSG)

The Syndicate Group (TSG) is a leading venture firm focused on revenue growth and new customer acquisition. Leveraging an ecosystem of strategic investors including more than 450 leading channel partner…

Posted in Featured | Tagged , , , | Comments Off on Publishers Spotlight: The Syndicate Group (TSG)

Spotlight: Whitepaper: Information security for the medical device industry

With a focus on the medical device industry, this paper provides software developers, hardware developers, and manufacturers with an understanding of the necessity and benefits of cybersecurity preparedness that can…

Posted in Featured | Tagged , , , , , | Comments Off on Spotlight: Whitepaper: Information security for the medical device industry

Log4j Showed Us That Public Disclosure Still Helps Attackers.

Public disclosure is still a bit of a mess By Alex Haynes, CISO, CDL At 2:25 pm on the 9th of December an infamous (now deleted) tweet linking a 0-day…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Log4j Showed Us That Public Disclosure Still Helps Attackers.

On The Frontline in The War Against Hackers

By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace.  Businesses are conducting…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on On The Frontline in The War Against Hackers

Directed Analytics – The Future of Data Management

By Simon Rolph, CEO & Founder of Such Sweet Thunder The world as we know it has changed – it’s undisputed. Industries of all kinds face a wholly different landscape…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Comments Off on Directed Analytics – The Future of Data Management

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

Web Application Penetration Testing Checklist with OWASP Top 10

We’ve gone ahead and compiled this article to shed some light on the top ten web application security risks according to OWASP and how you can use this as a…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Web Application Penetration Testing Checklist with OWASP Top 10

Mitigating Risk from Insider Threats in 2022

By Isaac Kohen, Teramind Back in August 2020, a story of an insider threat caught headlines when the employee turned down a $1M bribe to put ransomware on Tesla’s servers…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Mitigating Risk from Insider Threats in 2022

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X