informa
/

Sponsored Article

How to Determine the Best Managed Cybersecurity Model for You
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine t...
October 06, 2021
Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine t...
Dylan Owen, Associate Director for Cyber Services, Raytheon Intelligence & Space
October 06, 2021
5 min read
Article
DAST to the Future: Shifting the Modern AppSec Paradigm
NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches hap...
September 29, 2021
NTT Application Security's Modern AppSec Framework takes a DAST-first approach to defend applications where breaches hap...
Eric Rodriguez, Director of Demand Generation and Digital Marketing at NTT Application Security
September 29, 2021
5 min read
Article
A Cyber-Resilience Model for the Next Era
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide sec...
September 22, 2021
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide sec...
Rob Aragao, Chief Security Strategist at CyberRes, a Micro Focus line of business
September 22, 2021
5 min read
Article
Don't Try to Outsmart Cybercriminals. Outnumber Them!
Why hasn't a problem that's lasted for more than 40 years been solved after hundreds of billions of dollars have been sp...
September 15, 2021
Why hasn't a problem that's lasted for more than 40 years been solved after hundreds of billions of dollars have been sp...
Philippe Humeau, CEO and Co-founder of CrowdSec
September 15, 2021
6 min read
Article
Fact: Your Company Will Be Breached; How You Reply Is Key
The automation of cyberattacks means that no company is too small to target. In 2021, four out of five organizations rep...
September 08, 2021
The automation of cyberattacks means that no company is too small to target. In 2021, four out of five organizations rep...
James Slaby, Director, Cyber Protection, at Acronis
September 08, 2021
4 min read
Article
How to Prevent Ransomware Attacks
Before you toss out your legacy security solution, here are a few steps you can take to strengthen your digital defenses...
September 02, 2021
Before you toss out your legacy security solution, here are a few steps you can take to strengthen your digital defenses...
Aaron McIntosh, Director, Product Marketing, at ActZero.ai
September 02, 2021
6 min read
Article
AI vs. AI: Gearing Up for Battle With Deep Learning
Adversarial AI is the attacker's latest weapon; deep learning delivers the most resilient form of defense against these ...
August 25, 2021
Adversarial AI is the attacker's latest weapon; deep learning delivers the most resilient form of defense against these ...
Shimon N. Oren, VP of Research & Deep Learning, Deep Instinct
August 25, 2021
5 min read
Article
Increasingly, Cyber Resiliency Depends Upon Zero-Trust Implementation
Changes in how we work brought about by COVID-19 present the opportunity to implement zero-trust architectures to meet n...
August 23, 2021
Changes in how we work brought about by COVID-19 present the opportunity to implement zero-trust architectures to meet n...
John DeSimone, VP of Cybersecurity, Training & Svcs., Raytheon Intelligence & Space
August 23, 2021
6 min read
Article
The Power of Context in an Identity-Powered Era
We need the right answers to the right questions at the right time. And that deserves a new angle, an identity-powered a...
August 16, 2021
We need the right answers to the right questions at the right time. And that deserves a new angle, an identity-powered a...
Ramsés Gallego, International CTO, CyberRes, a Micro Focus line of business
August 16, 2021
4 min read
Article
How Much Revenue Is at Stake Due to Insider Risk?
Unlocking speed and agility in the work-from-anywhere collaboration culture demands a better understanding of the growin...
August 09, 2021
Unlocking speed and agility in the work-from-anywhere collaboration culture demands a better understanding of the growin...
Mark Wojtasiak, Vice President of Research and Strategy, Code42
August 09, 2021
5 min read
Article
5 Easy-to-Fix Vulnerabilities Threatening Your SMB
Small-business owners can no longer rely on their size to avoid cyberattacks, as no business bank account is too small i...
August 02, 2021
Small-business owners can no longer rely on their size to avoid cyberattacks, as no business bank account is too small i...
Alexander Ivanyuk, Global Director, Product and Technology Positioning, at Acronis
August 02, 2021
5 min read
Article
Relationship-Driven Incident Response = Resiliency to Ransomware Attacks
Ransomware is a threat that shouldn't take your organization by surprise if there is a resilient incident response plan ...
July 26, 2021
Ransomware is a threat that shouldn't take your organization by surprise if there is a resilient incident response plan ...
Brad Garnett, General Manager, Talos Incident Response, Cisco Secure
July 26, 2021
5 min read
Article
Cybersecurity Supply Chain Risk Is Not a Zero-Day Threat
With an increasing number of public supply chain attacks, it's important to remember that there are established framewor...
July 19, 2021
With an increasing number of public supply chain attacks, it's important to remember that there are established framewor...
Steve Caimi, Industry Solutions Specialist, Cisco Secure
July 19, 2021
5 min read
Article
Time to Focus on Compromised Credentials
Use of compromised credentials to penetrate and move laterally through networks is nothing new, but it's getting worse.
July 06, 2021
Use of compromised credentials to penetrate and move laterally through networks is nothing new, but it's getting worse.
Ralph Pisani, President, Exabeam
July 06, 2021
5 min read
Article
Avast Hacker Archives: Cybersecurity's Best "Aha!" Moments
In the AHA podcast, Avast CISO Jaya Baloo interviews cybersecurity's greatest minds and reveals the "Aha!" moments that ...
July 05, 2021
In the AHA podcast, Avast CISO Jaya Baloo interviews cybersecurity's greatest minds and reveals the "Aha!" moments that ...
Jaya Baloo, Chief Information Security Officer, Avast
July 05, 2021
5 min read
Article