Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out
When it comes to the ever-evolving realm of cybersecurity, threats have become more costly, aggressive, and increasingly likely to be infiltrated through trusted partners. Many organizations find it challenging to…
Posted in Spotlight
Tagged access control, AI anomaly detection, Angela Apolinar, audit trail, breach prevention, CMMC 2.0, compliance reporting, credential theft, Cyber Defense Magazine, cybersecurity, cybersecurity leadership, Data breach, data compliance, Data Protection, data tracking, data visibility, data-centric security, digital identity, digital transformation, DRM, encryption, enterprise security, external file sharing, FedRAMP, file download notification, hardened appliance, IBM cost of breach, inclusive technology, ISO 27001, ISO 27017, ISO 27108, Kiteworks, mentorship, NASA aerospace scholar, NIST framework, operational resilience, Private Data Network, regulatory compliance, Remote Access, risk policy editor, SafeEDIT, secure architecture, secure collaboration, secure data exchange, secure email, secure forms, security posture, sensitive data, SOC 2 Type II, space cybersecurity, streaming file editing, third-party risk, threat detection, Tim Freestone, trusted partners, user feedback, Verizon DBIR, Western Governors University, Women in Cybersecurity scholarship, women in STEM, workflow protection
Comments Off on Cybersecurity Spotlight: How Kiteworks is Redefining Zero Trust from the Data Out
Voices From the Front Lines: RSAC Conference 2025 Trip Report
All things Cybersecurity was found at this year’s RSAC Conference in San Francisco, California. If you missed this conference this year, let me fill you in with the details. This…
Posted in Featured
Tagged Access Management, ai, audit, AutoX, Badge Inc, biometrics, Black Girls Hack, Blue Team research, breach prevention, career development, community building, credential-free authentication, CrowdStrike, cryptography, cybersecurity, cybersecurity analyst, cybersecurity community, cybersecurity culture, cybersecurity education, cybersecurity professionals, cybersecurity training, digital identity, diversity in cybersecurity, executive leadership, Falcon lounge, Fortune 500, George Mason University, Identity Security, integrations, machine account discovery, machine identities, mentorship, Microsoft, misconfiguration, MIT, Old Dominion University, Phishing, RSAC Conference, Sacronix, sacumen, SailPoint, San Francisco, security culture, SquadCon, Tennisha Martin, threat detection, Tina Srivastava, underrepresented groups in tech, venture-backed, Victoria Hargrove, weakest link, women in cybersecurity
Comments Off on Voices From the Front Lines: RSAC Conference 2025 Trip Report