top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Better Visibility, Faster Incident Response: Can Security Data Lakes Transform Your Log Monitoring?
This guest blog was contributed by Dana Torgersen, Senior Director of Security Product Marketing, Sumo Logic Increasing cyberattacks and...
Sep 13, 2023


Unignorable Risks: The Consequences of Application Downtime
This guest blog was contributed by Doug Barney, Tech Evangelist, Progress Overview of Application Downtime and its Potential Impact...
Sep 8, 2023


AI-Powered Risk Management: A Shield Against Cyber Threats
This guest blog was contributed by Himanshu Joshi, Co-founder and CTO of Beaconer In an era where digital transformation has become...
Sep 8, 2023


3 Ransomware Trends That Enterprise Security Teams Must Monitor in 2023
This guest post was contributed by Ryan Estes, Intrusion Analyst, WatchGuard Technologies Ransomware continues to be a top cybersecurity...
Aug 21, 2023


How Generative AI Provides More Control Over the Domain Estate
This guest blog was contributed by Randal Pinto, CTO and co-founder, Red Sift Nearly two years ago, NSA Cybersecurity Director Rob Joyce...
Aug 21, 2023


Automation and Consolidation: The Key to Fixing the Security Skills Crisis
This guest blog was contributed by Marie Wilcox, Security Evangelist at Panaseer As the corporate cyber-attack surface grows, network...
Aug 18, 2023
bottom of page