top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Automation and Consolidation: The Key to Fixing the Security Skills Crisis
This guest blog was contributed by Marie Wilcox, Security Evangelist at Panaseer As the corporate cyber-attack surface grows, network...
Aug 18, 2023


Feeling Overexposed: Protect Your Digital Supply Chain
This guest blog was contributed by Marc Gaffan, CEO, IONIX The modern attack surface refers to the sum total of all the systems,...
Aug 3, 2023


Understanding the Role Data Sources Play in Better Threat Detection
This guest post was contributed by Nilesh Dherange, CTO at Gurucul Today, organizations are under constant threat from cybercriminals...
Jul 26, 2023


Posting an Emoji Can Be a Securities Violation
This guest blog was contributed by Susannah Hammond, Senior Regulatory Intelligence Expert at Theta Lake In a legal case alleging a firm...
Jul 20, 2023


How Confidence Scoring Is Delivering Superior Cybersecurity Threat Analysis
This guest blog was contributed by Bashyam Anant, Senior Director Product Management, Sumo Logic ML/AI and David Andrzejewski, Director...
Jul 11, 2023


From Security to Sustainability – How Immutable Storage Transforms Data Management
This guest blog was contributed by Steve Santamaria, CEO, Folio Photonics. In today's digital age, organizations are generating massive...
Jun 9, 2023
bottom of page