top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Understanding and Defending Against Fileless Malware
This guest blog was contributed by Zac Amos, Features Editor, ReHack Cybersecurity professionals face increasingly sophisticated attacks...
Jun 23, 2024


GitHub Under Siege: Phishing Campaign Targets Repositories with Malicious OAuth Apps
GitHub, the popular platform for developers and code hosting, is facing an ongoing extortion campaign where threat actors impersonate its...
Jun 11, 2024


The AI-Data Dilemma: Navigating Security in the Age of Algorithms
The collision of artificial intelligence and data security is creating a new frontier of challenges for Chief Information Security...
Jun 11, 2024


OpenText Survey Reveals AI-Driven Security Services as Key Growth Driver for MSPs and MSSPs
OpenText has released its annual OpenText Cybersecurity Global Managed Security Survey, highlighting the significant role of AI-led...
Jun 10, 2024


Lineaje Unveils Alarming Gaps in Software Supply Chain Security Preparedness
Lineaje, a top software supply chain security management provider, has released critical findings from their recent research conducted at...
Jun 10, 2024


CIOs and CISOs Must Ramp Up Defense Against Third-Party Cyberattacks
In today's interconnected digital landscape, the threat of cyberattacks is ever-present and evolving, particularly those originating from...
Jun 2, 2024
bottom of page