top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


The Modern SOC: A Cautionary Tale of Good Intentions
This guest post was contributed by Joe Schreiber, Co-Founder and Chief Executive Officer, appNovi "The road to hell is paved with good...
Oct 30, 2023


Five Methods to Stop QR Code Phishing Attacks
This guest post was contributed by Allen Lieberman, Chief Product Officer, Tessian. From banking enrollments to package deliveries, QR...
Oct 24, 2023


From Trust to Zero Trust: The Role of Identity Analytics and ITDR
This guest post was contributed by Craig Cooper, COO at Gurucul In 2023, the average cost of a data breach rose to $4.45 million, after...
Oct 18, 2023


Future-Proofing IT for Business Resilience
This guest blog was contributed by Alex Hoff, Chief Strategy Officer, Auvik Despite ongoing warnings of an economic slowdown and...
Sep 19, 2023


How New SEC Cybersecurity Regulations Impact Publicly Traded Companies
This guest blog was contributed by Devin Partida is the Editor-in-Chief of ReHack.com. Devin's work has been featured on Security...
Sep 18, 2023


Enterprise Applications of AI: The Vanguard of Tomorrow's Business Landscape
This guest blog was contributed by Raj Gummadapu, CEO, Techwave As we stand on the precipice of a new era in the business realm,...
Sep 18, 2023
bottom of page