PhishingSix ways to fend off spam in corporate networksDavid BalabanApril 18, 2024There’s no easy way to ward off spam – organizations need a mix of advanced email filtering, security protocols, modern data security tools, and user education.
IdentityHow AI-powered IAM can bolster securityShira ShambanApril 17, 2024While integrating AI into IAM promises many benefits, here are six challenges and potential pitfalls teams must address to succeed.
Critical Infrastructure SecurityThe Sisense Breach: A wake-up call to move beyond SBOMsNeatsun Ziv April 16, 2024Five ways companies can move from SBOMs to SaaSBOMs to more effectively secure SaaS applications.
RansomwareWhat if we made ransomware payments illegal?A.J. Nash April 15, 2024Several states are looking to pass laws making ransom payments illegal – only time will tell if the new statues work.
AI/MLIs AI-Generated code safe?Yoran SirkisApril 12, 2024No, it's not safe, but now’s the time to take proactive steps and adapt.
Critical Infrastructure SecuritySeven ways to prepare for the new CISA CIRCIA rulesJohn Morello April 11, 2024While the industry comments on and debates CISA’s new incident reporting rules, here are seven proactive steps CISOs can take to prepare.
AI/MLHow BEC attacks are evolving in the AI eraMike Britton April 10, 2024Here are three new BEC tactics CISOs need to watch for.
Zero trustVPN is dead, long live VPN!Sagie DulceApril 9, 2024Why aren't we simply making a better VPN?
PhishingWhat security agencies, regulators, and businesses get wrong about cybersecurityStu SjouwermanApril 9, 2024The industry needs to focus on the root cause of the vast majority breaches: human error.