Innovator Spotlight: Gurucul
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry.…
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry.…
ThreatLocker has created a list of the top 15 actions to secure an organization if employing a remote or hybrid…
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…
The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in…
There are events in business and life that put everything else into perspective. Sometimes, these are moments of crisis, yet…
I was thrilled to catch up with Endari during Black Hat USA 2024. Endari partners with startups and SMBs to…
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds…
Navigating the Cybersecurity Landscape: Achieving Impactful Wins Through Data, Collaboration, and Continuous Improvement Do not think of advocating for critical…
A common yet overlooked type of weak password are keyboard walk patterns. Learn more from Specops Software on finding and…