Drilling Down with XM Cyber
How many times have we watched a movie where there’s a blaring siren and a loudspeaker with a stern voice shouting, “This is not…
Voice of the Vendor: RSA Conference 2020, Part 2
He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…
Protecting Remote Workers From Cyber Threats
If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…
The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.
Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.
Malproxying: Leave your malware at home
Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…
7 Tech Companies Protecting Businesses From Cyber Threats
Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…
7 Key Features of a Breach and Attack System
Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…
Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation
Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…
7 top challenges for chief information security officers in 2020
The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…
Security software reviews, 2019: Lab tests of today’s top tools
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…
Five resolutions for CISOs heading into 2020
As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to begin preparing their cyber…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.