Why Continuous Training Must Come Before The AI-driven SDLC
By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world. But there are sectors where…
By Mike Burch, Director of Application Security, Security Journey Despite the hype, generative AI is unlikely to transform the world. But there are sectors where…
Phishing, a deceptive practice where cybercriminals impersonate legitimate entities to extract sensitive information, has been a significant threat in the digital world. Over the years,…
By Amit Dhingra, Executive Vice President of Network Services, NTT During the past three years, the enterprise cybersecurity environment has changed drastically. Security threats now…
By Ivan Shefrin, Executive Director, Managed Security Services, Comcast Business The rise of DDoS attacks is old news. Now, these attacks are becoming more dangerous,…
By Mike Nelson, Vice President of Digital Trust, DigiCert It’s safe to say that in 2023, the Internet of Things (IoT) train has left the…
By Zack Schwartz, Chief Revenue Officer, Trustifi As a provider of cybersecurity, we notice when certain trends begin to emerge, judging mostly from the interest…
By Ani Chaudhuri, CEO, Dasera In the Digital Age, businesses confront a dynamic landscape, compelled by the allure of innovation while wary of potential setbacks.…
2023 – What is new in the world of Ransomware By Elena Thomas, Digital Marketing Manager, SafeAeon Inc. Ransomware has been making headlines since 2021,…
Cyber Leader and Former Marine breaks down how we can recruit and train new cyber talent for this growing tech labor shortage By Chris Starling,…
By Jason Mafera, Field CTO, North America, IGEL The ‘endpoint’ has transformed from traditional desktop hardware to any number of devices, digital workspaces, and locations,…
By Saeed Valian, Chief Information Security Officer, symplr In the era of modernization, healthcare organizations are pushing for digitalization in their EMR’s. While there are…
By Milica D. Djekic The role of this case study is to explain how it’s feasible to exploit some business assets using the IoT search…