top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Focusing on Runtime Vulnerabilities in Today’s Software Landscape
This guest blog was contributed by Aviv Mussinger, CEO & co-founder of Kodem. Lately, application security and development teams are...
Nov 16, 2023


The Importance of Proactive Business Continuity Planning to Minimize Loss Amid Natural Disasters
This guest blog was contributed by Mitchell Perry, VP Compliance and Security at Access Amid increasing rates of wildfires, hurricanes,...
Nov 2, 2023


The Modern SOC: A Cautionary Tale of Good Intentions
This guest post was contributed by Joe Schreiber, Co-Founder and Chief Executive Officer, appNovi "The road to hell is paved with good...
Oct 30, 2023


Five Methods to Stop QR Code Phishing Attacks
This guest post was contributed by Allen Lieberman, Chief Product Officer, Tessian. From banking enrollments to package deliveries, QR...
Oct 24, 2023


From Trust to Zero Trust: The Role of Identity Analytics and ITDR
This guest post was contributed by Craig Cooper, COO at Gurucul In 2023, the average cost of a data breach rose to $4.45 million, after...
Oct 18, 2023


Future-Proofing IT for Business Resilience
This guest blog was contributed by Alex Hoff, Chief Strategy Officer, Auvik Despite ongoing warnings of an economic slowdown and...
Sep 19, 2023
bottom of page