Debunking the Top Myths in Vulnerability Management for A Safer Enterprise
By Dr. Deepak Kumar, Founder, and CEO, Adaptiva Cybersecurity is one of the most daunting challenges enterprises will face in 2020. According to IBM’s 2019 Cost of a Data Breach Report, the…
The Cyber Challenges of the 21st Century
By Emil M.Hasanov The National Cyber Strategy demonstrates my commitment to strengthening America’s cybersecurity capabilities and securing America from cyber threats. It is a call to action for all Americans…
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave…
Predicting the Direction of The PAM Market In 2020
A Look at What is Next on the Horizon for Securing Organizations’ Privileged Accounts By James Legg, President, and CEO, Thycotic As each year passes, we analyze the successes and…
Analysing Data Using the Intelligence Cycle: An Overview
By Alan Blaney, Managing Director of Focus Training When it comes to analyzing different forms of intelligence, using a detailed and coherent process is crucial in order to determine the…
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources…
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track…
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security….
Why Zero Trust Isn’t So Trustworthy
By Benny Lakunishok, CEO and co-founder of Zero Networks Everyone agrees a zero-trust network model is an optimal way to protect your network. But can you really reach that goal…
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information…
The Public Cloud. Is It Secure?
GTB Technologies, Inc. The Data Protection Company In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store…
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely…