top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


From Trust to Zero Trust: The Role of Identity Analytics and ITDR
This guest post was contributed by Craig Cooper, COO at Gurucul In 2023, the average cost of a data breach rose to $4.45 million, after...
Oct 18, 2023


Future-Proofing IT for Business Resilience
This guest blog was contributed by Alex Hoff, Chief Strategy Officer, Auvik Despite ongoing warnings of an economic slowdown and...
Sep 19, 2023


How New SEC Cybersecurity Regulations Impact Publicly Traded Companies
This guest blog was contributed by Devin Partida is the Editor-in-Chief of ReHack.com. Devin's work has been featured on Security...
Sep 18, 2023


Enterprise Applications of AI: The Vanguard of Tomorrow's Business Landscape
This guest blog was contributed by Raj Gummadapu, CEO, Techwave As we stand on the precipice of a new era in the business realm,...
Sep 18, 2023


Better Visibility, Faster Incident Response: Can Security Data Lakes Transform Your Log Monitoring?
This guest blog was contributed by Dana Torgersen, Senior Director of Security Product Marketing, Sumo Logic Increasing cyberattacks and...
Sep 13, 2023


Unignorable Risks: The Consequences of Application Downtime
This guest blog was contributed by Doug Barney, Tech Evangelist, Progress Overview of Application Downtime and its Potential Impact...
Sep 8, 2023
bottom of page