CISO

Positive Employee Experiences & Enhanced Cybersecurity Are One & the Same

Saša Petrović of Citrix shares his thoughts on the inseparable partnership between positive employee experiences and cybersecurity. Read the full guest article now for a fresh perspective as we head into 2021.

Is Your E-Commerce Business’ Growth Attracting Fraud?

Our guest today is Ed Whitehead of Signifyd. Join us as he shares thoughts on how to protect the growing ecommerce business from fraud.

Correlate Your Datasets for Improved IT Security & Monitoring

Anthony Osborn, Product Manager at Intergence, is in the guest spotlight this week with a look at data correlation and its potential for improving cybersecurity.

Akamai Identified as a Leader in DDoS Mitigation by Forrester

Akamai Technologies has been named a leader in DDoS mitigation in The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021. Find out what that means here.

Even the Security Firms… FireEye Latest in Long Line of Major...

Following the FireEye security breach in December 2020, we look at what this means for cybersecurity more generally and reflect on the top data breaches of the past five years.

Nine Myths About DDoS Defense

DDoS protection may be a key tenet of your overall security strategy, but there are several myths surrounding this critical area you need to...

Complimentary Report: The Cybersecurity Industry Is Broken

Investments in cyber technology have grown at roughly twice the rate of IT overall, but we still aren’t turning the tide against cyberinsurgency. Discover how leveraging your IT infrastructure can overcome security’s greatest structural challenges.

Thriving in the Cybersecurity Chess Game

One area emerging as a newer security threat is hardware and the firmware stored within that hardware. Find out more about the cybersecurity options to protect your business and customers.

‘New Normal’ Presents DevSecOps Teams with New Security Holes to Fill

Businesses have accelerated digital transformations in light of Covid-19 to maintain operability, but their actions have expanded the attack surface. The result is a network full of security holes. In this article, we take a look at the main areas DevSecOps must address to re-secure the enterprise.