How Organizations Can Achieve True Zero-Knowledge Security for Their Secrets Management
By Oded Hareven, CEO and Co-Founder of AKEYLESS Available solutions for secrets and keys management mostly fail in hybrid and multi-cloud environments. The AKEYLESS SaaS platform stands to change that….
The Growing Importance of API Security
APIs are everywhere, and they are ripe targets for malicious attacks By Ameya Talwalker, Co-founder and CPO, Cequence Security Earlier this year I wrote a blog about key trends in…
Industrial Control System Vulnerabilities: A Prime Target of Our Critical Infrastructure by Adversaries
By Dr. Daniel Osafo Harrison, DCS, C|CISO, CISM, CISA, CRISC, Security+ Industrial control system (ICS) is a dynamic technological system with subsystems such as programmable logic controllers (PLCs), Remote Terminal…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
5 Recruitment Predictions in Cybersecurity For 2020
By Karl Sharman As we prepare for more figures to be produced saying the amount of jobs unfilled has increased by another 20%, I want to challenge every person in…
Privacy – A misunderstood issue
By Michael J. Nash Introduction Living in a modern, interconnected world brings enormous benefits. The most obvious is that the speed of communication and information sharing has opened up new…
The Struggle of Updating Government Cybersecurity Measures
By Kayla Matthews The cybersecurity landscape is ever-changing, and staying on top of developments often requires promptness. Unfortunately, government bodies typically aren’t known for taking quick action. That’s because they…
5 Key Steps to Secure IOT Product Development
By Kateryna Boiko, Marketing Manager, Mobilunity A new concept that has taken the world by storm is the so-called “Internet of Things” (IoT). IoT refers to systems designed to transfer…
How to Address Multi-Cloud Security
By William Klusovsky, CISSP, CISM,NTT Ltd. Networks for our businesses are not as simple as they used to be. With the evolution of cloud environments and the multitude of “everything…
Investing in Cybersecurity
By Sean Drake, Venture Investor Reporter for Cyber Defense Magazine As one of the top Venture Investor Reporters for CDM, I get to cover all the hot and interesting cybersecurity…
ForgeRock 2020 Predictions
By Ben Goodman, SVP at ForgeRock and CISSP 2020 Will be the Beginning of the End of Passwords. Consumers already log in to dozens of protected resources everyday: from email,…
ForgeRock 2020 Predictions
By Eve Maler, Interim CTO, ForgeRock Healthcare patients will be able to share and redact their data in 2020. 2020 will be the year healthcare IT moves from data privacy…