Category: CyberDefenseMagazine
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security…
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to…
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role…
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced…
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical…
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial…
By Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and with good reason….
Abstract: The involvement of the Internet in the production of daily life has increased the demand for the security of…
WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats…
By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for…
By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they…
By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the…











