Your Passwords Have Already Been Hacked
Time to Remove the Ticking Time Bomb From Your IT Security Strategy By Shahrokh Shahidzadeh, CEO, Acceptto There was a time where dozens of stolen passwords or digital credentials would […]
How to Avoid Being Breached In 2020
By Randy Reiter CEO of Don’t Be Breached Recent Data Breaches Disclosed in 2020 In February 2020 the United States Department of Defense (DOD) disclosed a data breach that occurred […]
Cyber Leads Global Business Risks for First Time: Allianz Risk Barometer 2020
By Kelly Castriotta, North American Head of Product Development for Financial Lines at Allianz Global Corporate & Specialty For the first time ever, Cyber incidents (39% of responses) ranks as […]
Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the […]
KPMG Recommends Steps to Bolster Cybersecurity in the COVID-19 Era
By Ton Diemont, Head of Cybersecurity at KPMG in Saudi Arabia Hackers are jumping on the COVID-19 pandemic to exploit global uncertainty Riyadh, 07 April 2020: The outbreak of Covid-19 […]
Smart Buildings
Understanding the Security Risk By Andrea Carcano, Nozomi Networks Co-founder and CPO Smart Buildings: Understanding the Security Risks Today many of the world’s most forward-thinking workplaces are deploying smart technologies […]
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Cyber Defense and Cultural Heritage
By Milica D. Djekic Let’s look back several centuries in the past and try to imagine what technologies the people of that time might have used in their lives. If […]
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security. […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]
Protect Yourself from Threats and Fraud With XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also […]
TEHTRIS XDR Platform, A Holistic Cybersecurity Solution
By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries […]
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec […]
CASB+Is Essential Infrastructure for The Cloud Mobile Digital Transformation
By Salah, VP of Marketing at CipherCloud The ongoing cloud mobile digital transformation has brought cloud access security brokers (CASB+) front and center as an important part of enterprise cloud […]
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the […]
A Green Database
By Chris Jordan, CEO, Fluency Security Datacenters are basically toxic computer equipment in a constantly cooled warehouse. Their footprint is growing across the globe in places like Loudoun County, Virginia, […]
GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions. By Oren T. Dvoskin, Global Marketing Director, Sasa Software Introduction The California Consumer Privacy Act, AB 375 (”CCPA”) was enacted in June […]
Microsoft Brings Application Isolation to Office 365 with Application Guard
Users No Longer Have to Choose Between Security and Productivity By David Weston, Director of OS Security, Microsoft At Microsoft, we spend more than $1 billion annually on security and […]
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures […]
Moving Network Security to The Cloud
What is secure access service edge (sase) and why it matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only […]
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale. […]
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read, […]
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict […]
The Weakest Points in Your Network Are Your People
How to automate your network edge security to protect against human error and prevent cyberthreats from spreading By Graham Walker, VP Marketing, Allied Telesis “Protect your network borders; don’t let […]
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that. […]
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that […]
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal […]
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer […]