Why identity has emerged as the security perimeter in hybrid deployments By Guido Grillenmeier, Chief Technologist…
Categoría: Infosec
Auto Agregado por WPeMatico
The Quantum Tipping Point
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever…
Too Hot to Handle:The case for Zero Trust and SASE
By Jonathan Lee, Senior Product Manager, Menlo Security Insecurity today we often see the continued reliance…
On The Frontline in The War Against Hackers
By Damien Fortune, Chief Operations Officer of Secured Communications In the wake of a global shift…
Phishing Techniques in Disguise: What to Look for And Why You Should
By Rotem Shemesh, Lead Product Marketing Manager, Security Solutions, at Datto Phishing is a familiar concept…
3 Cybersecurity Certainties for 2022
By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between…
Have We Learned from Our Past Mistakes to Prevent Future Cyberattacks?
By Marc Packler, President, CISO Advisory, Silent Quadrant Gartner’s article, “The Top Cybersecurity Predictions for 2021-2022,”…
Don’t Become a Horrible Headline: Some Tips on Redesigning Your Threat Posture for The 2022 Threat Landscape
By Omar Zarabi, Founder and CEO, Port53 Technologies As in previous years, the DefCon of the…
Endpoint Malware and Ransomware Volume Already Exceeded 2020 Totals by the End of Q3 2021
By Corey Nachreiner, CSO, WatchGuard Technologies The cybersecurity landscape of today is constantly evolving and threat…
Why Changing Classified Document Status Can Affect Risk Levels and How Proactive Cybersecurity Methods Can Help
By Sam Hutton, SVP, Glasswall As ransomware attacks, insider threats, data breaches and phishing attacks against…