Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

By Joanne Godfrey, Security Evangelist, ZeroNorth Companies are rushing to launch digital transformation initiatives and roll out new software products and services at a greater speed than ever before. But…

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Comments Off on Building Secure Software Right from the Start: Four Steps for an Effective AppSec Strategy

Looks Like Russian Hackers Are on An Email Scam Spree

By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship is compromised through email…

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Looks Like Russian Hackers Are on An Email Scam Spree

Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

By Egon Rinderer, Global Vice President of Technology and Federal CTO, Tanium Most agencies have successfully met initial telework surge requirements – putting the basics in place to continue essential…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X