World’s Largest Cybersecurity Unicorn Lives in China
By Edward Tsai – Director of Investment, Qi An Xin Who would think that the world’s largest Cybersecurity unicorn lives in China? In China, everything is on a larger scale….
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read,…
COVID-19: Disaster Preparedness for the Digital-First Business
By Otavio Freire, President, CTO and Co-Founder SafeGuard Cyber COVID-19, also known as coronavirus, is proving to be a stubborn pathogen. Tragically, the global death toll has now surpassed 3,000….
The Evolution of Cybersecurity In 2020
Why security is moving from the IT department to the boardroom By Chad Walter, VP of Sales and Marketing, IGI Cybersecurity experts are constantly looking to the future to predict…
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls…
A Terrifying Diagnosis: Cybercriminals Are Attacking Healthcare (But We Can Fight Back)
By Pieter Danhieux, Co-Founder and Chairman/CEO of Secure Code Warrior Cyberattacks have become a way of life these days. People almost expect to hear news about some new vulnerability or…
How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that….
The Consumer Technology Association – What Trends Lie Ahead in the 2020’s
If one thing was made boldly apparent at the CES 2020, it’s that everything is trending toward connectivity. Soon, there will be scarcely any facet of our daily lives that…
Not All Hackers Are Criminals, And Some of The Good Guys Can Earn A Million Dollars
Dr. Roberto Di Pietro, a full professor of cybersecurity at Hamad Bin Khalifa University’s College of Science and Engineering, explains why there is a misconception about the term ‘hackers’. The…
A Single Security Recommendation to Solve an Age-Old Problem
By Morey Haber, CTO & CISO, BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. They may have some universal…
Predictive Cyber Intelligence and Defenses using InfoSec Award Winning Cythereal
DTAG-CTI (Deutsche Telekom – Cyber Threat Intelligence) protects clients against cyber-attacks worldwide on a scale beyond most companies capabilities due to the nature of our business. Like us, the adversaries…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…