The Importance of Endpoint Security

The Importance of Endpoint Security

Are your organization’s endpoints secure?  That’s the question keeping more than a few CISO’s up at night—and with ... Read More The post The Importance of Endpoint Security appeared first on Hyperproof ...

Now Is The Perfect Time For CISOs to Tame the Security Frontier

This is the second installment of a six-part series offering guidance to CISOs who tell us finding success in the world… The post Now Is The Perfect Time For CISOs to Tame ...
Adaptive Shield

Adaptive Shield Rises to SaaS App Security Challenge

Adaptive Shield emerged from stealth to address the need to better secure software-as-a-service (SaaS) applications. Fresh off raising an additional $4 million in funding, the company’s namesake platform identifies and prioritizes weaknesses ...
Security Boulevard

Providing 100 Percent Malware-free Email and Web Browsing

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats. I had the opportunity to chat with one of our largest customers the other day ...

Finding the Right and Secured Video Platforms for your Business

The post Finding the Right and Secured Video Platforms for your Business appeared first on CCSI ...
Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

In episode 133 for August 10th 2020: What we can learn from the big Twitter hack, why everyone is trying to ban TikTok, and pharmacy chain Rite Aid’s use of facial recognition ...
contractor

3 Tips to Safeguard Your Digital Future

The ongoing COVID-19 crisis has proven that applications are the driving force of the world economy. With a massive shift from brick-and-mortar locations to online operations across all industries during lockdowns, companies ...
Security Boulevard
Guide: How to Choose an AI-Based Cybersecurity Platform

Guide: How to Choose an AI-Based Cybersecurity Platform

Most cybersecurity vendors today tout some form of “Artificial Intelligence” as an underlying mechanism for the differentiation of their product among the market. But if everyone is saying they have AI, and ...
Why quantum computing is a risk to traditional cybersecurity

Quantum Computing and the evolving cybersecurity threat

In the future quantum computers may be able to break strong encryption keys, this means businesses must now start to reevaluate their cybersecurity policies to mitigate this threat ...
Matthew Pascucci

Podcast Episode 18: Video and Search Security

The post Podcast Episode 18: Video and Search Security appeared first on CCSI ...