top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


What’s Next After Log4j?
This guest post was contributed by Lou Steinberg, founder and Managing Partner of CTM Insights, a cybersecurity research lab and...
Dec 22, 2021


Following In Estonia’s Footsteps: Blueprints for a Successful Digital ID
This guest blog was contributed by Kaarel Kotkas, CEO and Founder of Veriff. The need to facilitate travel safely and securely is...
Dec 10, 2021


The Importance—and Risk—of Certificate Expiration
This blog was contributed by Chris Hickman, CSO, Keyfactor. Secure Sockets Layer (SSL) certificates are an important factor in securing...
Dec 8, 2021


Top 5 Common Misconceptions About Ransomware
This guest post was contributed by Jon Toor of Cloudian. Ransomware continues to be the top cybersecurity threat, with attacks up 62% in...
Nov 30, 2021


Shifting the Healthcare Sector to a Predictive Cybersecurity Approach
This guest post was contributed by Saket Modi, Co-Founder, and CEO at Safe Security. This year was full of critical cybersecurity...
Nov 23, 2021


Applying Automation to Rule Recertification
This guest blog was contributed by Ruvi Kitov, CEO and co-founder, Tufin Reviewing firewall rules and ensuring they’re still accurate,...
Nov 5, 2021
bottom of page