Please turn on your JavaScript for this page to function normally.
Tanya Janca
Sharing knowledge and moving towards securing all the things!

Originally a software developer (for 17 years), Tanya Janca, CEO of We Hack Purple, switched to security seven years ago. She founded the company to share as much knowledge as …

open source
Open source software plays an important role in the success of leading organizations

DataStax unveiled research findings that show how leading organizations are winning with data, and how others can close the gap. Through insights from over 500 technology …

user
Demystifying cybersecurity with a more human-centric approach

Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains …

cloud
Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an …

geometry
How real-time computing can sound the kill chain alarm

Major attacks and ransomware incidents like SolarWinds, Colonial Pipeline or JBS highlight the critical role cybersecurity plays in protecting infrastructure and the economy. …

arrows
RIP guest access, long live shared channels!

While many yearn to return to pre-pandemic days, some aspects of our new normal are welcome. Most notable is the flexibility of hybrid working, with a great majority of …

AWS
AWS S3 can be a security risk for your business

Along with the shift to the cloud and emergence of modern digital services and applications, new security concerns have emerged for organizations. More connectivity means more …

cloud binary
Collaboration is key for cloud innovation

Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …

zero
The importance of compute lifecycle assurance in a zero-trust world

With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …

Crime-as-a-Service
With Crime-as-a-Service, anyone can be an attacker

Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used …

chess
Gamification can redefine the cybersecurity demo experience

Lead generation is the easy part of the sales cycle. Marketing activities, sales enablement tools, events, and so on should create the perfect environment that allows sales …

application
A digital shift requires a new approach to asset management: How to reduce security risks

The global pandemic forced organizations to rapidly accelerate their digital transformation. As a result, nearly overnight, companies spanning all sizes and sectors deployed …

Don't miss

Cybersecurity news