Threat Modeling High Value Assets
By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware…
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec…
Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the…
The Power of Purple
A Proactive Cybersecurity Paradigm By Daniel DeCloss, CEO, PlexTrac, Inc. Cybersecurity is hard, and attackers are relentless. The job of protecting an organization from cyber threats can feel overwhelming and…
5 Ways Hackers Can Bypass Your MFA
Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on…
Defending Forward
Human-Machine Teaming for Automated Predictive Prevention at Scale By James Wallace Hess, Director of Development, Cythereal Today’s threat landscape demands automated analysis and predictive prevention to efficiently harden protection structures…
Cyber Prevention Is No Panacea
Detection is Key When Prevention Fails By Tony Cole, CTO, Attivo Networks Last year Gartner estimated cybersecurity spending to grow to $124 Billion US dollars globally, and by 2021 to…
Moving Network Security to The Cloud
What is secure access service edge (sase) and why it matters By Paul Martini, CEO, iboss The world of technology that exists today is substantially different from that of only…
General Motors & the AUTO-ISAC are “Defending YOUR Wheels™”*
San Francisco – The title of the keynote presentation at RSA by Mary Barra, Chairman and Chief Executive Officer of General Motors, aptly describes the reality for anyone who is…
Coronavirus as an Opportunity to Evolve Security Architecture
By Zohar Rozenberg, VP of Cyber Investments for Elron [Editor’s Note: This article is included in a series of current commentaries on the broad-ranging technical and economic effects of the…
World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale….
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read,…