Protect Yourself from Threats and Fraud With XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also…
Threat Modeling High Value Assets
By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware…
RSA Conference 2020 – What’s Keeping Cybersecurity Experts Up At Night?
San Francisco, CA – At the RSA Conference 2020, Gary Berman and I had the privilege of interviewing some of the top executives in the cybersecurity Community about what concerns…
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec…
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly…
Coronavirus scams, found and explained
By David Ruiz Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this…
Securing the Next Generation Data Center
By Dr. Ratinder Paul Singh Ahuja, Chairman of the Board & Chief R&D Officer ShieldX Networks Securing Cloud-Generation Data Centers As many firms transition their data centers into the…
The Power of Purple
A Proactive Cybersecurity Paradigm By Daniel DeCloss, CEO, PlexTrac, Inc. Cybersecurity is hard, and attackers are relentless. The job of protecting an organization from cyber threats can feel overwhelming and…
5 Ways Hackers Can Bypass Your MFA
Think Your Sensitive Systems Are Secure? Think Again. By Dana Tamir, VP Market Strategy for Silverfort Let me start by saying – you should be using MFA (Multi-Factor Authentication) on…
The Evolution of PAM
By Mahesh Babu, Sr. Director and Head of Product Marketing at Remediant When assessing an organization’s cybersecurity posture, privileged accounts are the most critical to safeguard because of their proverbial…
Vulnerability Management Democratized
New solutions are built with ease of use and efficiency in mind By Todd Nielsen, Director, Product Management, IGI Vulnerability Management has always been complicated; it required pro tools (read,…
Firewall Sandwich: A Hacker’s Delight, Unless…
No single solution can offer a silver bullet for cybersecurity. Nevertheless, critical facilities such as manufacturing plants and power stations are currently in danger of relying too heavily on firewalls…