CISO Suite

CISO Talk: Security Challenges During COVID-19

In this inaugural episode of CISO Talk on TechStrong TV, Alan Shimel and Unisys CISO Mat Newfield talk about the…

3 months ago

[Webinar Recap] Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management

We recap the important information security and risk management leaders need to know when it comes to Cloud Security Posture…

3 months ago

Top Distribution Firm LOGON Software Asia and the Third-Party Application Security Vendor Reflectiz are Announcing a New Partnership

Hong-Kong, / Tel-Aviv, September 30th. Hong-Kong based cyber-security solutions distributor LOGON Software Asia, and Reflectiz, a cyber security company specializing…

3 months ago

School is back in session for students and for hackers

School is back in session for students, staff, and unfortunately for hackers too. Schools have not been in session for…

3 months ago

Negotiating with Ransomware Gangs

Really interesting conversation with someone who negotiates with ransomware gangs: For now, it seems that paying ransomware, while obviously risky…

3 months ago

Cybersecurity Lessons from the Pandemic: Perception of Risk

The more “mature” among us may recall when decision-making under uncertainty was based on the concept of “rational economic man.”…

3 months ago

Understanding Cybersecurity Supply Chain Risk Management (C-SCRM)

Cybersecurity Supply Chain Risk Management (C-SCRM) deals with more than protecting an organization from cyber-attacks on third parties. It also…

3 months ago

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Security and risk management leaders need to invest in Cloud Security Posture Management tools like Intelligent CSPM The post The…

3 months ago

Security Is No Longer A Binary Decision

David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate…

3 months ago

Security Is No Longer A Binary Decision

David Strom explains why cybersecurity is evolving and why treating it as a strictly binary decision is no longer appropriate…

3 months ago