top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Feeling Overexposed: Protect Your Digital Supply Chain
This guest blog was contributed by Marc Gaffan, CEO, IONIX The modern attack surface refers to the sum total of all the systems,...
Aug 3, 2023


Understanding the Role Data Sources Play in Better Threat Detection
This guest post was contributed by Nilesh Dherange, CTO at Gurucul Today, organizations are under constant threat from cybercriminals...
Jul 26, 2023


Posting an Emoji Can Be a Securities Violation
This guest blog was contributed by Susannah Hammond, Senior Regulatory Intelligence Expert at Theta Lake In a legal case alleging a firm...
Jul 20, 2023


How Confidence Scoring Is Delivering Superior Cybersecurity Threat Analysis
This guest blog was contributed by Bashyam Anant, Senior Director Product Management, Sumo Logic ML/AI and David Andrzejewski, Director...
Jul 11, 2023


From Security to Sustainability – How Immutable Storage Transforms Data Management
This guest blog was contributed by Steve Santamaria, CEO, Folio Photonics. In today's digital age, organizations are generating massive...
Jun 9, 2023


How To Protect Your Data Privacy and Security When Using ChatGPT
This guest blog was contributed by Graham Hosking, Solutions Director for Compliance, Quorum Cyber Security and privacy is a hot topic,...
Jun 8, 2023
bottom of page