Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Sheltering from the Cyberattack Storm

As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile…

Posted in Featured | Tagged , , , , | Comments Off on Sheltering from the Cyberattack Storm

Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the…

Posted in Featured | Tagged , , , , , | Comments Off on Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management

Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges…

Posted in Featured | Tagged , , , | Comments Off on Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management

How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals…

Posted in Featured | Tagged , , | Comments Off on How the Newest Tech Changes Cybersecurity Needs in the Legal Industry

The First 10 Days of a vCISOs Journey with a New Client

“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by…

Posted in Featured | Tagged , , , | Comments Off on The First 10 Days of a vCISOs Journey with a New Client

Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

CyTwist has launched its Preemptive Cyber Attack Management Platform (PCAM) to enable defenders to expose attacks early and accurately while creating efficiencies in the SOC. They are building a platform…

Posted in Featured | Tagged , , , , , | Comments Off on Publishers Spotlight: CyTwist: Defend Forward – Stop Your Attacks without IOCs

Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

Formed by TrendMicro, the Zero Day Initiative (ZDI) was created to encourage the reporting of 0-day vulnerabilities privately to the affected vendors by financially rewarding researchers. At the time, there…

Posted in Featured | Tagged , | Comments Off on Publisher’s Spotlight: The Zero Day Initiative (ZDI): Financially Rewarding InfoSec Researchers

The Quantum Tipping Point

Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter Shor showed how a quantum computer could factorize large numbers with exponential…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on The Quantum Tipping Point

On The Frontline in The War Against Hackers

By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift toward remote work, crime is moving from physical space to cyberspace.  Businesses are conducting…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on On The Frontline in The War Against Hackers

3 Cybersecurity Certainties for 2022

By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on 3 Cybersecurity Certainties for 2022

Data Security Must Be a Priority as Employees Quit in Record Numbers

By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no signs of slowing down. The latest U.S. jobs report showed that 4.5…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Data Security Must Be a Priority as Employees Quit in Record Numbers

Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue Officer, BreachQuest Introduction In the last six months, cyber attacks increased by…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Cyber Insurance: What Executives Need to Know Before Obtaining Coverage

How to Protect All Five Stages of the IoT Security Lifecycle

Smarter security for smart devices By Mitchell Bezzina, Senior Director, Product Marketing, Cloud-delivered Security Services, Palo Alto Networks The dependency on IoT devices to enable business, capture data, and facilitate…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How to Protect All Five Stages of the IoT Security Lifecycle

Getting Started with Active Directory Security

Evaluating, Benchmarking and Creating a Strategy By Justin Kohler, Director of BloodHound Enterprise, SpecterOps Over 90% of the Fortune 1000 use Microsoft Active Directory (AD) for identity and access management….

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Getting Started with Active Directory Security

12th Anniversary Top InfoSec Innovator & Black Unicorn Awards for 2024 are now Open! Finalists Notified Before BlackHat USA 2024...

X