by Noor Boulos | Aug 16, 2022 | Blog
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity Kasey Ello After more than two years of having our days filled with Zoom meetings, many of us in the cybersecurity industry have been eager to get back to in-person events and conferences to reconnect...
by Yann LeBorgne | Aug 9, 2022 | Blog
Automation in Cybersecurity: Overcoming Barriers to Adoption Yann Le Borgne “Automation” has become a buzzword in cybersecurity circles. That’s not surprising in an environment where security specialists are in short supply and under intense pressure to defend the...
by Guest Blog | Aug 2, 2022 | Blog
Correlating Data across Multiple Security Systems and Tools with XDR Syed Kaptan Gartner defines XDR as solutions that “automatically collect and correlate data from multiple security products to improve threat detection and provide an incident response capability.”...
by Noor Boulos | Jul 26, 2022 | Blog
Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year Kasey Ello Summertime often means vacation time and a chance to rest, relax and catch up on some reading. But for those of us in cybersecurity it can be hard to truly disconnect. The threat...
by Marc Solomon | Jul 19, 2022 | Blog
Security Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And when we’ve been burned...
by Guest Blog | Jul 12, 2022 | Blog
Ethics, Design and Cybersecurity Bella Jones Connections Behind Dark UX Patterns and Social Engineering Tactics If you work in an organization, you’ve probably had to take a cybersecurity training course at some point during your time there. Regardless of whether you...