top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Identity Access Management Fortifies Against Hospital Cybersecurity Threats
This guest blog was contributed by Zubaid Kazmi, Managing Director, Identity Access Management, MorganFranklin Consulting In January,...
Feb 20, 2024


Crucial Strategies to Defend Your Business Against Ransomware Threats
This guest blog was contributed by Nazy Fouladirad, President and COO of Tevora Today, ransomware represents a significant obstacle in...
Feb 20, 2024


Why Mobile App Binary Scanning is Essential to Safeguarding Applications
This guest post was contributed by Krishna Vishnubhotla, VP of Product Strategy, Zimperium Do you know how many applications you have on...
Feb 19, 2024


The Evolution of Threats in 2024: LLMs and Ransomware Top of Mind for CISOs
This guest blog was contributed by Kevin Reed, CISO at Acronis In 2023 we witnessed some cases of high-profile attacks - one of which...
Feb 6, 2024


Best Practices For Accelerating Cyberattack Detection
This guest post was contributed by James Allman-Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber The slow detection...
Feb 5, 2024


Will Industry Go Far Enough to Protect Critical Infrastructure and Manufacturing in 2024?
This guest post was contributed by Ilan Barda, Founder, and CEO at Radiflow In late November 2023, a small western Pennsylvania water...
Jan 31, 2024
bottom of page