top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Identity Access Management Fortifies Against Hospital Cybersecurity Threats
This guest blog was contributed by Zubaid Kazmi, Managing Director, Identity Access Management, MorganFranklin Consulting In January,...
Feb 20, 2024


Crucial Strategies to Defend Your Business Against Ransomware Threats
This guest blog was contributed by Nazy Fouladirad, President and COO of Tevora Today, ransomware represents a significant obstacle in...
Feb 20, 2024


HackerOne: Vulnerabilities in GenAI Tools Create Security and Safety Issues
We spoke with Dane Sherrets, Solutions Architect at HackerOne, to uncover the intricacies of AI vulnerabilities, particularly in GenAI...
Feb 13, 2024


Sensos Secures Series A Funding to Revolutionize Supply Chain Management
Sensos, a spin-off of Sony Semiconductor Israel, has announced the successful closure of its Series A funding round, aimed at advancing...
Feb 8, 2024


Google Unveils Rebranded Gemini AI App, Additional Integration Across Android, Cloud and More
Google has made a bold leap into the realm of artificial intelligence (AI) with the launch of its groundbreaking Gemini app, promising...
Feb 8, 2024


John Hammond, Huntress: How OpenAI’s Work With the Pentagon, Ransomware Are Shaping the Public Sector
We sat down with John Hammond, principal security researcher at Huntress, a managed security platform founded by a former NSA agent, to...
Feb 7, 2024
bottom of page