top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Applying Automation to Rule Recertification
This guest blog was contributed by Ruvi Kitov, CEO and co-founder, Tufin Reviewing firewall rules and ensuring they’re still accurate,...
Nov 5, 2021


Create a Viable Hybrid Security Strategy
This guest blog was contributed by Eyal Arazi, Radware As we enter 2022, it has never been more important to have a viable cloud security...
Nov 1, 2021


Top 3 Microsoft AD Security Horror Stories of 2021
This guest blog was contributed by Andy Robbins, Technical Architect at SpecterOps. At SpecterOps, our experts bring extensive technical...
Oct 29, 2021


A Retailer’s Journey in Protecting Against Web Supply Chain Attacks
This guest blog was contributed by Ronny Ong, Technical Architect at ReadingGlasses.com. From opening our first Reading Glasses boutique...
Sep 8, 2021


Jason Kent, Cequence Security: I Hack Charities
This guest blog was contributed by Jason Kent, Hacker-in-Residence at Cequence Security. Walk through the crowd at BlackHat or DEFCON and...
Aug 9, 2021


3 Password Security Challenges That Threaten the Permanent Hybrid Workforce
This blog was contributed by Darren James, Head of Internal IT at Specops Software. Remote workers are starting to return to their old...
Aug 4, 2021
bottom of page