Please turn on your JavaScript for this page to function normally.
handshake
How to build a security tool that sells

In my experience as a CISO in the industry, as well as in my current position as CISO-in-Residence at YL Ventures, an early-stage, cybersecurity-focused venture capital firm, …

Biden legitimizes cryptocurrency with regulatory exploration

For some time, cryptocurrency was considered a fringe currency – a libertarian means of investing that challenged the traditional framework of brokers, trade desks and …

shark
Are you willing to take a calculated risk? Quantifying your cyber risk and predicting future threats

We can all agree that cyber attacks are inevitable. The next step for cybersecurity professionals is reaching a consensus on the best way to prepare for unknown threats …

code
The simple secret to app security? Time

The thing about being a security consultant is that people are always looking to you for the “secret” to building a secure digital anything. And by “secret,” they usually mean …

zero
Building trust in a zero-trust environment

A recent study by MITRE and DTEX revealed that despite years of industry efforts against insider threats, there isn’t enough data – or systems advanced enough – to spot all …

hole
How to contain a privileged access breach and make sure it doesn’t happen again

When attackers pull off a privileged access breach, they have a beachhead into your network. Regardless of whether it’s software or users that are ill-protected, threat actors …

identity
Does the future of digital identity offer us greater security and convenient experiences?

Much of the promise associated with future digital identity infrastructures is associated with greater automation of the identity lifecycle and the provision of greater …

captcha
Why are CAPTCHAs still used?

The success of your online business hinges on your customers’ ability to properly recognize crosswalks or traffic lights. I’m, of course, referring to CAPTCHAs, the online …

Privacy Shield
Data privacy laws are an opportunity to become more honest in reaching your target audience

Data privacy regulations are designed to give consumers more transparency into and control over how their data is collected, shared and used, especially as more consumers grow …

Department of Defense
Understanding US Defense Department’s relaxed cybersecurity protocols under CMMC 2.0

Department of Defense (DoD) contractors struggling to comply with upcoming cybersecurity regulations under the Cybersecurity Maturity Model Certification (CMMC) can breathe a …

application
Increasing security for single page applications (SPAs)

Single page applications (SPAs) have become the most popular way to create websites that feel faster for the end-user without hitting the server every time a user interacts …

IoT
5 steps that simplify IoT security for OEMs

As digital transformation materializes, businesses are becoming more reliant on devices that support valuable IoT services. As the reliance on these devices grows, so does the …

Don't miss

Cybersecurity news