Deep Instinct Stops 0days
Zero chance that cybersecurity will ever get away from Zero Days. That’s the standard that the industry has come to accept – until now....
CIOSO Global: Empowering the Community in the Fight Against Cyber Threats
Greg Sullivan, Founding Partner of CIOSO Global, shared his extensive background in the field, detailing his transition from software development to cybersecurity roles, including...
Julian Lee Discusses Compliance with LogicGate
Julian Lee recently sat down to discuss with LogicGate’s VP of Global Strategic Alliances, Andrew Steioff, on the topic of SEC compliance for organizations,...
2019 Forecasts from ESET
Security is a big issue year over year and is the number one challenge companies are facing. In 2019, ESET is still seeing data...
The battle for business buy-in: Three ways to justify your IT security spend
By Evgeniya Naumova
Proving return on investment in IT security – an almost impossible task for IT professionals. Why? Because they’re often found trying to...
Rezonate: Identity Management Reinvented
Identity security is broken across multiple tools and stakeholders in the organizations, each lacking the context or control over many parts of human and...
eSentire Launches Integrated MDR and SIEM Platform for Full Threat Visibility and Rapid Response
eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider, today announced a partnership with Sumo Logic, the leading cloud-native machine data...
SafeBreach: Providing a Cohesive Risk Management Solution
SafeBreach, a leader in enterprise security validation, announced an integrated exposure management platform that combines its breach and attack simulation (BAS) technology with a...
Uncovering the Paradox in AI with Axonius
Daniel Trauner of Axonius talked about new data from Axonius which has uncovered a surprising paradox in the way companies are investing in AI–...
RevealSecurity Detects Malicious Insiders and Imposters
RevealSecurity is a developer of AI platform intended to give cybersecurity against the insider threat to enterprises. The company's product is powered by a...















