Category: CyberDefenseMagazine
By Ulrica de Fort-Menares, VP of Product & Strategy, Indeni What is Hybrid Mesh Firewall? With the rise of hybrid…
Make your security strategy good for business. By David Weisong, CIO at Energy Solutions Utility companies are, like just about…
Did you know that only 4% of CISOs have real-time visibility into runtime vulnerabilities in containerized production environments (https://www.dynatrace.com/news/blog/runtime-vulnerability-management-still-vexing-organizations/)? According…
By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…
By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…
By Marc Packler, President, CISO Advisory, Silent Quadrant and Tony Thomas, President & Chairman, Tony Thomas & Associates LLC Automation…
By Michael Levit, Co-Founder and CEO of Tempest As all of our lives have moved online, the collection and sharing…
The UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been…
By John Linford, Forum Director, The Open Group Security Forum, and Open Trusted Technology Forum The Open Group Security &…
Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud…
By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon…











