Category: Uncategorized

Relieving The Cyber Metrics Headache

by Dr Leila Powell, Lead Security Data Scientist, PanaseerAn oft-quoted business maxim is “if you can’t measure it, you can’t manage it”. Despite its straightforward logic, this truism has its detractors. These...

Collaboration Is The Key To Staying Secure In Uncertain Times

by Matt Walmsley, EMEA Director at VectraThe events of the past few weeks and months have put a huge amount of pressure on CISOs and IT security teams to ensure their networks...

Cash Dethroned

How a Global Pandemic changed… Everything.by Anthony Cardoza, Business Unit Director for the Americas, XTN Cognitive Security®In 1993, the Wu-Tang Clan released their hit song C.R.E.A.M. (Cash Rules Everything Around Me).  Although...

Improving Cybersecurity with Focused Employee Training

People are still a company’s most valuable resource – and its greatest threat. When it comes to cybersecurity, human error is responsible for up to 60% of data breaches. Aside from malicious...

How Deception Technology Helps to Protect Against IoT Attacks

Carolyn Crandall, Chief Deception Officer at Attivo NetworksSecuring both business and operation technology (OT) networks effectively against cyber threats is a constant challenge. It requires a multi-layered approach, with strong external-facing defenses,...

Saving the SOC. How to Increase Investigation Speed, Efficiency and Accuracy

By Nir Greenberg, senior director of field engineering and customer success, Illusive NetworksThe status quo for most SOCs is untenable. Analysts are burning out. There aren’t enough of them, and they are...

How To Secure IT And OT In Industrial And Manufacturing Environments

by Chris Dobrec, Vice President of Product Marketing, ArmisOperational Technology (OT) systems, which include critical infrastructure, are increasingly becoming more exposed to cyber attacks. The control and telemetry systems used in industrial...

Technology for Contact Tracing Needs to Focus on API Security While Easing “Stay at Home” Restrictions

By Alban Diquet, Head of Engineering, Data TheoremMany countries are easing “stay at home” restrictions imposed to combat the novel coronavirus. Government and health leaders are looking for ways to conduct mass-scale...

Follow us

20,672FansLike
2,368FollowersFollow
0SubscribersSubscribe

Instagram

Most Popular

Navigating the Nature of Remote Work and Securing Employee Communications

 The remote work trend does not show signs of stopping. According to survey data from KPMG that investigates the work experience post-COVID-19, 68 percent...

What Is Cryptojacking and How Do You Prevent It?

 How worried should you be?by Martin BanksCybersecurity professionals know the importance of staying abreast of emerging threats and taking decisive action to conquer them....

Reducing Risk and IT Burden with the Agentless Approach

by Wade Lance, field CTO, Illusive NetworksESG research has found that 76% of organizations say threat detection and response is more difficult today than...