Please turn on your JavaScript for this page to function normally.
Christopher Sestito
Machine learning creates a new attack surface requiring specialized defenses

Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …

idea
How to minimize your exposure to supply chain attacks

Supply chain attacks are on the rise, and many organizations seem unsure on how to respond to the threat, but I’m here to tell you that there are several steps you can take to …

Jonathan Reiber
Cyberattack prevention is cost-effective, so why aren’t businesses investing to protect?

Cyberattacks like ransomware, BEC scams and data breaches are some of the key issues businesses are facing today, but despite the number of high-profile incidents, many …

network
Now is the time to focus on software supply chain security improvements

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

attacks
Why there is no quick fix for cyber attacks

Cybersecurity threats keep evolving, meaning that most, if not all, organizations could be dangerously exposed as the digital ecosystem develops. While some organizations …

idea
The future of attack surface management (ASM)

The legacy approach to attack surface management falls short of what modern organizations require: contextual awareness. Security teams increasingly suffer from threat …

insider threat
Only 25% of organizations consider their biggest threat to be from inside the business

A worrying 73.48% of organizations feel they have wasted the majority of their cybersecurity budget on failing to remediate threats, despite having an over-abundance of …

approved
Israel’s new cyber-kinetic lab will boost the resilience of critical infrastructure

In a building under construction at the Advanced Technologies Park in Be’er Sheva, the “cyber capital” of Israel, a new governmental lab is also taking shape: the …

user
Why firms need to harness identity management before it spirals into an identity crisis

Digital transformation is at the top of every organization’s agenda today. But while it is easy to make bold, forward-looking plans on paper, the reality of implementing …

money
Minimizing risk: Key cybersecurity-related M&A considerations

Global M&A hit new highs in 2021 reaching an eye-popping $5.1 trillion in total deal value, according to PwC. With economic headwinds leaving acquisition as the only …

fraud detection
How to identify and combat online fraud

As the popularity of Buy Now, Pay Later (BNPL) grows, organizations and consumers must remain vigilant or risk becoming a victim of fraud, as account takeover attacks – where …

Managing the Dynamic Nature of Cyber Security
Introducing the book: Managing the Dynamic Nature of Cyber Security

In order to provide organizations with knowledge to lower their cyber risk, Dr. Sander Zeijlemaker, launched his book – “Managing the Dynamic Nature of Cyber Security: A …

Don't miss

Cybersecurity news