How To Manage Your Small Business In Time Of Crisis
By Milica D. Djekic It’s always a challenge to manage your small business, but especially in times of crisis. Such a situation requires special skills, such as crisis management skills,…
Achieving Effective User Lifecycle Management Through Automation
By Jeff Stein, Information Security Architect, Reputation.com When considering the security of an enterprise, a key area ripe for automation should be user lifecycle management. The topic is important not…
Does SASE Tick the Box for The Future of Network Security?
By Yair Green, CTO at GlobalDots The enterprise of today works with an upgraded portfolio which can be viewed as the result of an overall digital transformation. This in turn…
Moving Beyond Honeypots to Next-Generation Deception Technology
By Wade Lance, field CTO, Illusive Networks When security professionals hear the word “deception,” they tend to immediately think of honeypots. That association needs to be updated. The concept of…
How Pizza Can Be the Recipe to Understand Cloud Security
By Yohanan Berros, Customer Operation Managers, XM Cyber It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises…
Economic Efficiency in Cyber Defense
By Mark Evans, VP Marketing, Endace The previous two articles in this series addressed Visibility and Agility as key requirements for stronger cyber defense. This last article in the series…
Better Network Visibility: Removing the Security Blindfold
By Cary Wright, VP Product Management, Endace Recent research shows that enterprise teams are very concerned about the ability to protect their networks from cyber threats. Concerns run the gamut: …
Best Practices for Better SOC Analysis
By Chris Calvert, co-founder, Respond Software Security analysts are a breed apart. They work long hours, using their intelligence and attention to detail to sort false alarms from real threats….
What You Need to Know About DDoS Weapons Today
By Ahmad Nassiri, Security Solutions Architect at A10 Networks A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to…
A Timely Report for a Changing World – The 2020 Verizon Mobile Security Index
As the world rapidly adapts to working remotely and virtual learning, the importance of communicating cybersecurity best practices while using mobile devices is more important than ever before. Given the…
Not All Secure Certificates Created Equal
By Cal Evans, Developer and SiteGround Ambassador Data security is essential for every person who uses the Internet, but if you have your own site, the stakes are even higher….
Social Engineering in Getting Competitive Advantage
By Milica D. Djekic Our world is full of wonders. You would never be aware of how beautiful and adorable something can be unless you do a deep dive to…